IBCS P3 Challenges Faced

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

Challenges Faced + Ethics for IBCS M26

Last updated 8:46 AM on 4/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

49 Terms

1
New cards

Focus of White Box Testing

Internal workings, code logic, structure.

2
New cards

White Tester Knowledge

Requires deep understanding of the codebase.

3
New cards

Approach of White Box Testing

Code paths, branches, logic.

4
New cards

Tools/methods of White Box

Code review, unit testing, path testing.

5
New cards

Advantages of White Box Testing

Helps identify logical errors and code vulnerabilities. Better code optimisation and thoroughness achieving a high code coverage. Can be easily automated for uninterrupted service delivery.

6
New cards

Disadvantages of White Box Testing

Requires extensive coding expertise and time. Can be expensive to conduct. Does not reflect experiences on the user-level. High maintenance and inability to detect requirements that aren’t implemented already.

7
New cards

Use Case of White Box Testing

Debugging and verifying the logic of critical code. Used to verify interaction between code units and how data is handled in an application.

8
New cards

Suitability of White Box Testing

Offers more depth and precision than other test methods. Governance needs to be strict as this method can be invasive and PHIs are at risk.

9
New cards

Focus of Black Box Testing

Functionality and end-user experience.

10
New cards

Black Box Tester Knowledge

No knowledge of internal code structure or implementation.

11
New cards

Approach of Black Box Testing

Testers validate the system against requirements.

12
New cards

Tools/methods of Black Box Testing

Functional testing, regression testing (re-running functional/non-functional tests to ensure modifications to code haven’t affected software performance), UI testing.

13
New cards

Advantages of Black Box Testing

Simulates real user and malicious hacker behaviour, unbiased testing. Finds weakest part of system from a hacker POV.

14
New cards

Disadvantages of Black Box Testing

With limited knowledge, there is a risk of harming the system and jeopardising continued service. Especially in the IoMT with a possible compromise to the interconnectedness of the system.

15
New cards

Use Case of Black Box Testing

Testing UI and overall system behaviour. Holistic approach

16
New cards

Suitability of Black Box testing

Less suitable for hospital settings due to higher disruption risk.

17
New cards

Focus of Grey Box Testing

Combination of functionality and some internal code logic. Authentication, input validation, weak or missing Role Based Access Control (RBAC - end-user access authorisation) checks.

18
New cards

Tester knowledge of Grey Box Testing

Partial understanding. Insider threat or external hacker with some insider information.

19
New cards

Approach of Grey Box TEsting

Testers leverage limited system knowledge to design tests for a healthcare system. Conducted in controlled environment.

20
New cards

Tools/methods of Grey Box

Burp Suite, OWASP ZAP, manual inspection

21
New cards

Advantages of Grey Box Testing

Balanced approach. Wider coverage than other testing methods. More efficient use of resources as plans are better tailored with partial knowledge while not being incredibly comprehensive.

22
New cards

Disadvantages of Grey Box Testing

Dependent on partial knowledge. Can be difficult to test complex cases. Hard to trace root of bugs without knowledge of source code.

23
New cards

Suitability of Grey Box testing

More suitable for live hospital networks requiring uninterrupted service delivery

24
New cards

Evaluation of testing methods.

Best is grey box. While not as thorough, allows for inspection of front-end vulnerabilities and more in-depth analysis for later exploits in response plan. Also simulates most realistic hacker perspective. However, on outdated IoTs, white box may be best as they can crash under heavy attacks.

25
New cards

Why is penetration testing important in healthcare?

Heatlhcare keeps a lot of medical data online now

A data breach is costly, averaging over $10 million over incident (2024 IBM report).

26
New cards

Operational Continuity

Patient data needs to be completely secure and stay that way since it is a constant target.

27
New cards

Encryption

Add additional layers of encryption such as biometric authentication or MFA to protet patient data.

28
New cards

Staff Training during Vulnerability Testing

Helps staff know what is out of order during the PTES to stop any issues and continue to work as smoothly as possible.

29
New cards

Emergency Procedures

Developing clear and actionable guidelines for potential disruptions i.e. isolating systems and maintaining communication.

30
New cards

Back-up infrastructure

Implements redundancy for critical systems (off-site back-ups, cloud storage, secondary servers) to maintain OC while testing and in case of breach. Minimises potential downtime.

31
New cards

Why uninterrupted service delivery is important

  • Patient safety/life-critical services

  • Continuous access to EHRs and clinical systems

  • Avoiding disruption to hospital operations

  • Maintaining trust of healthcare services

32
New cards

Ethics: Proper Authorisation

Unapproved testing could breach hospital policy, violate regulations, impact systems. Phase 1 creates an audit trail establishing written authorisation.

33
New cards

Ethics: Data confidentiality and integrity

Exposure, modification, and the leaking of hospital data is at risk when scanning or exploitation takes place. Phase 2 and 4-6 handle this, helping to define rules around data and enforce safe, controlled exploitation and post-exploitation.

34
New cards

Ethics: Non-disruption of services

Testing may interrupt IoMT, internal communications, and patient monitoring, putting patients at risk. Phase 1 puts systems in place to identify “no-touch” systems, testing windows, and critical assets. This plans for business continuity and disaster recovery plans.

35
New cards

Ethics: Reporting and Responsiveness

Poor reporting in Phase 7 could lead to miscommunication, vulnerabilities being exposed to the wrong people, and delays in remediation. Responsible disclosure and patch management are assured through the PTES reporting framework.

36
New cards

Ethics: Ethical use of social engineering

Vishing or pretexting may distress staff, extract sensitive information, and reduce trust. Human-factor risk assessment must be considered when gathering information through these means. Phase 2 helps ethical hackers to set ethical boundaries and consent-based reconnaissance.

37
New cards

Ethics: Controlled exploitation without causing harm

Exploitation attacks could crash systems and/or corrupt data.

38
New cards

How to maintain operational continuity?

  • Stratified testing environment

  • Sandbox environment

  • Strict RoE

39
New cards

Stratified Testing Environment

Organised testing in which parts of the system are segmented and tested on when they are not live.

40
New cards

Sandbox Environment

An isolated testing space used to safely run code. For aggressive testing, this environment may mirror the hospital’s network to ensure patient safety.

41
New cards

Strict Rules of Engagement

Example: testers only capturing metadata to prove access instead of getting actual patient records or use synthetic/fake data to nullify privacy risk.

42
New cards

Investigate how network scanning/mapping and OSINT can be used

OSINT for public facing tech → passive and undetectable. For initial targeting.

Network scanning + mapping → more active. May risk crashing legacy IoT devices.

White box for fragile/legacy IoMT devices on the network.

43
New cards

Passive Intelligence Gathering

Overall, avoids detection and engaging directly with the target system.

  • Search engine dorking

  • Shodan + Maltego

  • WHOIS queries - identifies domain, registration dates, and DNS servers.

  • Social media analysis (LinkedIn, Instagram, TikTok)

44
New cards

Active Intelligence Gathering

Directly interacting with target system; higher risks on system but detailed/less general insight.

  • Netwrok scanning → Nmap + Zenmap

  • Hping (sending packets) → Useful for testing network connections and examining firewall configurations.

  • Burp Suite

  • OWASP ZAP

  • Exploitation → Metasploit Framework; a popular tool for developing and executing PTES exploits.

45
New cards

Developing Response Plan

  • Incident detection crucial for data privacy → stops attack early and prevent data exfiltration → protexts patient/EHR confidentiality

  • But, recovery is paramount for patient safety. That is priority.

  • Example: in ransomware scenarios, recovery is the only safe option.

  • Response plans should prioritise backups and segmentation over perfect detection of threats.

46
New cards

Extension: WannaCry NHS Ransomware Attack (2017)

Hit companies worldwide in spring 2017, cost the NHS ÂŁ92M, and operations for several days.

  • Delivered via phishing locking files via encryption until a bitcoin sum was paid.

  • Exposed a specific Windows vulnerability, not an attack on unsupported software

  • NHS criticised for using outdated IT systems, including Windows XP, a 17-year-old OS vulnerable to attack.

  • NHS also had not rehearsed for a crisis with a recovery plan that had not accounted for large scale attacks.

47
New cards

Extension: Conti HSE Ransomware Attack (2021)

Cyberattack on Health Service Executive (HSE) in Ireland that shut IT systems down nationwide, reverting hospitals to analog media.

  • Phishing (malicious Excel doc) for initial access.

  • Cobalt strike used to establish persistence and move laterally (jumping from low-value resources to access high value resources) before deploying ransomware.

  • Severely interrupted service, even disrupting radiation/cancer treatment for patients.

  • Only 2/10 cancer trial units had a response plan in place.

48
New cards

Extension: PwnedPiper Pnuematic Tube System Vulnerability (2021)

Researchers found nine key vulnerbailties in Swisslog Healthcare TransLogic pneumatic tube systems, used by >80% of North American hospitals to transport blood, medication, and lab samples.

  • The PTS system supports variable speed transactions, allowing urgent messages, but this can be exploited to disrupt service

  • RFID authentication was employed in the PTS system, but this exposes staff records and RFID credentials

  • The system had an alert messaging system integrated to hosptial comms that may be abused to interfere with workflow

49
New cards

IoMT Infrastructure Vulnerabilities

Conectivity and data richness, are strengths and vulnerabilties for IoMT devices!

  • Wearable devices often rely on wireless communication protocols such as Bluetooth which may be intercepted during attacks, allowing for the manipulation of data.

  • Inadequate data encryption and poor security practices can result in unintentional data leakage

  • Attackers can gain unauthorized access to implantable devices, such as pacemakers or insulin pumps, potentially altering their settings to harm the patient.

  • Implantable devices can be targeted with DoS attacks, which can turn off the device, potentially leading to life-threatening situations for patients