Threat Modeling for Mobile Health Systems
HC3 Threat Briefing – Threat Modeling for Mobile Health Systems
Please see below the HHS Health Sector Cybersecurity Coordination Center (HC3) threat brief. This brief focuses on Threat Modeling for Mobile Health Systems and covers the following topics:
- Introduction
- Threat Modeling Overview
- S.T.R.I.D.E
- S.T.R.I.D.E: Spoofing
- S.T.R.I.D.E: Tampering
- S.T.R.I.D.E: Repudiation
- S.T.R.I.D.E: Information Disclosure
- S.T.R.I.D.E: Denial of Service
- S.T.R.I.D.E: Elevating Privileges
- Authentication Threats
- Authorization Threats
- Privacy Threats
- Audit and Logging Threats
- References
- Questions
- Related Resources & News
- Health-ISAC Hacking Healthcare 8-26-2024
- What is Threat Intelligence? A Comprehensive Overview
- Why Cybercriminals Target Healthcare Data and How Organisations Can Protect Themselves
- Federal Authorities Work to Boost Health-Care Cybersecurity
- Health-ISAC Hacking Healthcare 8-9-2024
- Health-ISAC Medical Device Blog – VEX
- Podcast: Health-ISAC Featured in Cyberwire Daily episode 2021
- Health-ISAC Hacking Healthcare 8-2-2024
- Protecting Healthcare Organizations with Human-Centric Email Security
- American Hospital Association and Health-ISAC Joint Threat Bulletin