Medical Physicist's Role in Cyber Security
27 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the main objectives of the medical physicist's role in cyber security?

  • To promote medical research
  • To discuss why cyber security is critically important for in healthcare (correct)
  • To improve healthcare services
  • To design new healthcare technologies
  • What is a major concern in healthcare that medical physicists need to address?

  • Hospital administration
  • Equipment maintenance
  • Medical research funding
  • Patient data security (correct)
  • What do cyber criminals often target in healthcare?

  • Medical research data
  • Patient medical records (correct)
  • Pharmaceutical supplies
  • Medical equipment
  • What can clinical physicists do to prevent cyber security threats?

    <p>Taking simple and effective precautions</p> Signup and view all the answers

    What is the focus of cyber security in healthcare beyond electronic health records (EHR)?

    <p>Cyber-Physical Systems</p> Signup and view all the answers

    What was the outcome of the cyber attack on the radiation oncology department?

    <p>All radiation oncology patient appointments were cancelled for 3 days</p> Signup and view all the answers

    What is the primary focus of Cyber Security?

    <p>Protecting computers, networks, programs and data from unauthorized access</p> Signup and view all the answers

    Why is Cyber Security crucial in Radiation Oncology?

    <p>All of the above</p> Signup and view all the answers

    What is the duration the clinical physicist and dosimetry staff spent on QA before resuming patient treatments?

    <p>Numerous hours</p> Signup and view all the answers

    When did patient treatments resume after the cyber attack?

    <p>On the 5th day</p> Signup and view all the answers

    What is the primary function of malicious software such as Trojan Horses?

    <p>To gain unauthorized access to computer systems</p> Signup and view all the answers

    What is a common threat to cyber security in public Wi-Fi networks?

    <p>Untrusted wireless access points</p> Signup and view all the answers

    What is a key concern when sharing patient health data via email?

    <p>Using unencrypted email messages</p> Signup and view all the answers

    What is a common characteristic of medical device companies?

    <p>Having less than 50 employees</p> Signup and view all the answers

    What is a primary focus of medical device companies' research and development?

    <p>Producing patient care functionality</p> Signup and view all the answers

    What is a current challenge in the medical device industry?

    <p>Lack of general technology resources, processes, and security knowledge</p> Signup and view all the answers

    What is the main purpose of using firewalls, virtual private networks, and encryption in a clinical environment?

    <p>To protect data and ensure secure communication</p> Signup and view all the answers

    What is the main benefit of whitelisting in a medical device network?

    <p>To create a list of trusted entities that can access the device or network</p> Signup and view all the answers

    Why may IT systems not allow non-registered computers to be connected to hospital networks?

    <p>To ensure data security and prevent unauthorized access</p> Signup and view all the answers

    What is the main purpose of two-factor authentication in a medical environment?

    <p>To add an extra layer of security to the login process</p> Signup and view all the answers

    What is the main reason why medical devices should not be directly accessible to the Internet?

    <p>To prevent unauthorized access and potential security breaches</p> Signup and view all the answers

    Why is it important to encourage vendors to integrate their login system with the hospital's active directory system?

    <p>To enable single sign-on for vendors</p> Signup and view all the answers

    What is a recommended practice for vendor systems to ensure device data encryption?

    <p>Adhering to industry standards such as NIST's FIPS-140-2</p> Signup and view all the answers

    What is a crucial aspect of account use best practices for medical devices?

    <p>Ensuring no non-expiring passwords and no regular accounts with elevated administrator privileges</p> Signup and view all the answers

    What is a benefit of using site-to-site VPN for vendor support?

    <p>Improved security for vendor device communications</p> Signup and view all the answers

    Why is it important for vendor systems to upgrade operating systems and third-party/open source applications?

    <p>To minimize the risk of security vulnerabilities</p> Signup and view all the answers

    What is a recommended practice for securing medical devices?

    <p>Avoiding hard-coded or default passwords and ensuring secure encryption</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser