Blog

The SPHINX solution is featuring a modular architecture, which comprises 5 building blocks. These modules entail a series of components each one of them implementing a specific capability of SPHINX. In this context, the main architectural building blocks should be elaborated on a decomposed perspective...

Continue from blog entry SPHINX Use Cases: Part VI Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Exploiting Remote Patient Monitoring Services Description: A patient undergoes a...

SPHINX project labels the cybersecurity threats that a healthcare organisation may face as an outcome of either a malicious action (i.e. malware, hijacking, data theft, DoS/DDoS), a human error (configuration error, unauthorized access, BYOD), a system failure (i.e. overload, software and/or firmware failure, outdated systems),...

Continue from blog entry SPHINX Use Cases: Part V Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Intrusion in the Clinical Centre’s Wireless Network Description: As...

Continue from blog entry SPHINX Use Cases: Part IV Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Compromised BYOD Enables Stealing of Patient Data Description:...

Much like many other critical infrastructures, Healthcare Sector comprises several human and technological capital which is essential for its function. Subsequently, in such capital a series of critical assets can be recognised. In the context of cybersecurity, assets represent any resource that is worth protecting,...