Skip to main content

Table 7 Examples of ASP estimates [51, 52]

From: Risk management-based security evaluation model for telemedicine systems

Attack

Elapsed time

Expertise

Knowledge of system

Window of opportunity

Equipment

Required attack potential

Sum

Rating

Leakage of patient information from telemedicine device

0

6

7

4

4

21

High

Forgery via wiretapping and spoofing

0

3

0

4

4

11

Moderate

MITM attacks using rogue AP

0

6

3

10

4

23

High

Health information sniffing

0

0

0

4

4

8

Basic