Abstract
In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive breakdown of two medical device technologies and how its vulnerabilities could severely harm patients is provided. Possible solutions and cybersecurity mitigation techniques are given to help manufacturers lessen risks for consumers and eliminate vulnerabilities for medical devices within the market. The discussion and research of this topic can bring awareness to the dangers of IoT devices in public health. This can help ensure the security and privacy of patients worldwide.
Faculty Advisor/Mentor
Young Choi
Document Type
Paper
Disciplines
Digital Communications and Networking | Information Security | Public Health
DOI
10.25776/j9x0-gp08
Publication Date
2020
Upload File
wf_yes
Included in
Digital Communications and Networking Commons, Information Security Commons, Public Health Commons
IoT Devices in the Public Health Sector
In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive breakdown of two medical device technologies and how its vulnerabilities could severely harm patients is provided. Possible solutions and cybersecurity mitigation techniques are given to help manufacturers lessen risks for consumers and eliminate vulnerabilities for medical devices within the market. The discussion and research of this topic can bring awareness to the dangers of IoT devices in public health. This can help ensure the security and privacy of patients worldwide.