From: Risk management-based security evaluation model for telemedicine systems
Attack | Elapsed time | Expertise | Knowledge of system | Window of opportunity | Equipment | Required attack potential | |
---|---|---|---|---|---|---|---|
Sum | Rating | ||||||
Leakage of patient information from telemedicine device | 0 | 6 | 7 | 4 | 4 | 21 | High |
Forgery via wiretapping and spoofing | 0 | 3 | 0 | 4 | 4 | 11 | Moderate |
MITM attacks using rogue AP | 0 | 6 | 3 | 10 | 4 | 23 | High |
Health information sniffing | 0 | 0 | 0 | 4 | 4 | 8 | Basic |