5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

Your Data is Only as Secure as Your Device

By Staff Author | September 6, 2013

The inherent insecurity of many medical devices was highlighted in a recent FDA and Homeland Security alert. Over 300 devices have been identified that utilize a hard code password, creating a huge security loophole. With so many medical devices now collecting and storing patient data, this raises the question of how secure is the data stored on these devices? In the case of these 300 devices with hard coded passwords, not very secure at all.

There are two ways to gain access to the data stored on medical devices. The first is to intercept the data during communication. The second is to access the data from the device itself. Like any good chain, security is only as strong as its weakest link. To ensure the data is secure during communication, secure communication protocols such as IPSec, SSH, and SSL can be used. These protocols encrypt the data during communication, keeping it safe even if the traffic is intercepted.

To ensure that someone does not gain access to the device, and thereby gain access to the data stored on the device, requires that security measures be built into the device. The device should utilize a strong, configurable password or other secure authentication method. An endpoint firewall can also be utilized to control communication and block attacks. The bottom line is, your data is only as secure as your device.

Click here to see a feature article from Alan Grau on device security at mdtmag.com.


Filed Under: RF

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

VNA port extender
75 Ω RF switch instrument connects 12 ports to a 2-port VNA
Open RAN test service adds colocation capabilities
Switch operates DC to 20 GHz with 128 configurable connection states for asymmetric SerDes testing
Butler Matrix
Butler Matrix drives Wi-Fi and other phased-array antennas

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World