Blog

Continue from blog entry SPHINX Use Cases: Part VI Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Exploiting Remote Patient Monitoring Services Description: A patient undergoes a...

SPHINX project labels the cybersecurity threats that a healthcare organisation may face as an outcome of either a malicious action (i.e. malware, hijacking, data theft, DoS/DDoS), a human error (configuration error, unauthorized access, BYOD), a system failure (i.e. overload, software and/or firmware failure, outdated systems),...

Continue from blog entry SPHINX Use Cases: Part V Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Intrusion in the Clinical Centre’s Wireless Network Description: As...

Continue from blog entry SPHINX Use Cases: Part IV Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Compromised BYOD Enables Stealing of Patient Data Description:...

Much like many other critical infrastructures, Healthcare Sector comprises several human and technological capital which is essential for its function. Subsequently, in such capital a series of critical assets can be recognised. In the context of cybersecurity, assets represent any resource that is worth protecting,...

Supported by European Union’s Horizon 2020 Research and Innovation Programme SPHINX is taking into account the current, existing and emerging, standards on cybersecurity and the corresponding directives and regulations from the European Union. In this context, two key EU regulations are establishing the framework of...