Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review and create attack flow (Frederic Bourdelier Submission) #8

Open
pbjason9 opened this issue May 31, 2022 · 0 comments
Open

Review and create attack flow (Frederic Bourdelier Submission) #8

pbjason9 opened this issue May 31, 2022 · 0 comments

Comments

@pbjason9
Copy link
Collaborator

Identity of each component and subcomponent within the system is critical. Attackers may replace components with "hacked" firmware, or suppliers may have firmware/software that is compromised in the supply chain, and activates when a component is replaced in the surgical system (whether through failure, normal maintenance, or even "hacking" the system to simulate failure, causing maintenance to illegitimately replace components with compromised ones).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant