Skip to main content

Table 7 Examples of ASP estimates [51, 52]

From: Risk management-based security evaluation model for telemedicine systems

AttackElapsed timeExpertiseKnowledge of systemWindow of opportunityEquipmentRequired attack potential
SumRating
Leakage of patient information from telemedicine device0674421High
Forgery via wiretapping and spoofing0304411Moderate
MITM attacks using rogue AP06310423High
Health information sniffing000448Basic