IBCS P3 Challenges Faced

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Challenges Faced + Ethics for IBCS M26

Last updated 11:08 AM on 3/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

Focus of White Box Testing

Internal workings, code logic, structure.

2
New cards

White Tester Knowledge

Requires deep understanding of the codebase.

3
New cards

Approach of White Box

Code paths, branches, logic.

4
New cards

Tools/methods of White Box

Code review, unit testing, path testing.

5
New cards

Advantages of White Box Testing

Helps identify logical errors and code vulnerabilities. Better code optimisation and thoroughness achieving a high code coverage. Can be easily automated for uninterrupted service delivery.

6
New cards

Disadvantages of White Box Testing

Requires extensive coding expertise and time. Can be expensive to conduct. Does not reflect experiences on the user-level. High maintenance and inability to detect requirements that aren’t implemented already.

7
New cards

Use case of White Box Testing

Debugging and verifying the logic of critical code. Used to verify interaction between code units and how data is handled in an application.

8
New cards

Suitability of White Box Testing

Offers more depth and precision than other test methods. Governance needs to be strict as this method can be invasive and PHIs are at risk.

9
New cards

Focus of Black Box Testing

Functionality and end-user experience.

10
New cards

Black Box Tester Knowledge

No knowledge of internal code structure or implementation.

11
New cards

Approach of Black Box

Testers validate the system against requirements.

12
New cards

Tools/methods of Black Box Testing

Functional testing, regression testing (re-running functional/non-functional tests to ensure modifications to code haven’t affected software performance), UI testing.

13
New cards

Advantages of Black Box Testing

Simulates real user and malicious hacker behaviour, unbiased testing. Finds weakest part of system from a hacker POV.

14
New cards

Disadvantages of Black Box Testing

With limited knowledge, there is a risk of harming the system and jeopardising continued service. Especially in the IoMT with a possible compromise to the interconnectedness of the system.

15
New cards

Use Case of Black Box Testing

Testing UI and overall system behaviour. Holistic approach

16
New cards

Suitability of Black Box testing

Less suitable for hospital settings due to higher disruption risk.

17
New cards

Focus of Grey Box Testing

Combination of functionality and some internal code logic. Authentication, input validation, weak or missing Role Based Access Control (RBAC - end-user access authorisation) checks.

18
New cards

Tester knowledge of Grey Box Testing

Partial understanding. Insider threat or external hacker with some insider information.

19
New cards

Approach of Grey Box

Testers leverage limited system knowledge to design tests for a healthcare system. Conducted in controlled environment.

20
New cards

Tools/methods of Grey Box

Burp Suite, OWASP ZAP, manual inspection

21
New cards

Advantages of Grey Box Testing

Balanced approach. Wider coverage than other testing methods. More efficient use of resources as plans are better tailored with partial knowledge while not being incredibly comprehensive.

22
New cards

Disadvantages of Grey Box Testing

Dependent on partial knowledge. Can be difficult to test complex cases. Hard to trace root of bugs without knowledge of source code.

23
New cards

Suitability of Grey Box testing

More suitable for live hospital networks requiring uninterrupted service delivery

24
New cards

Extension: In-class discussion on Healthcare Application Case Study

Identifying real-world attack scenarios. Exposed vulnerabilities in low-level user-access (receptionists) and authentication. No direct exploits found, but many issues with security headers and low protection from brute-force exploitation. Exposed internal structures —> could be further explored with white-box testing.

25
New cards

Evaluation of testing methods.

Best is grey box. While not as thorough, allows for inspection of front-end vulnerabilities and more in-depth analysis for later exploits in response plan. Also simulates most realistic hacker perspective.

26
New cards

Why is penetration testing is important in healthcare?

Heatlhcare keeps a lot of medical data online now

A data breach is costly, averaging over $10 million over incident (2024 IBM report).

27
New cards

Operational Continuity

Patient data needs to be completely secure and stay that way since it is a constant target.

28
New cards

Encryption

Add additional layers of encryption such as biometric authentication or MFA to protet patient data.

29
New cards

Staff Training during vulnerability testing

Helps staff know what is out of order during the PTES to stop any issues and continue to work as smoothly as possible.

30
New cards

Emergency Procedures

Developing clear and actionable guidelines for potential disruptions i.e. isolating systems and maintaining communication.

31
New cards

Back-up infrastructure

Implements redundancy for critical systems (off-site back-ups, cloud storage, secondary servers) to maintain OC while testing and in case of breach. Minimises potential downtime.

32
New cards

Why uninterrupted service delivery is important

  • Patient safety/life-critical services

  • Continuus access to EHRs and clinical systems

  • Avoiding disruption to hospital operations

  • Maintaining trust of healthcare services

33
New cards

Ethics: Proper Authorisation

Unapproved testing could breach hospital policy, violate regulations, impact systems. Phase 1 creates an audit trail establishing written authorisation.

34
New cards

Ethics: Data confidentiality and integrity

Exposure, modification, and the leaking of hospital data is at risk when scanning or exploitation takes place. Phase 2 and 4-6 handle this, helping to define rules around data and enforce safe, controlled exploitation and post-exploitation.

35
New cards

Ethics: Non-disruption of services

Testing may interrupt IoMT, internal communications, and patient monitoring, putting patients at risk. Phase 1 puts systems in place to identify “no-touch” systems, testing windows, and critical assets. This plans for business continuity and disaster recovery plans.

36
New cards

Ethics: Reporting and Responsiveness

Poor reporting in Phase 7 could lead to miscommunication, vulnerabilities being exposed to the wrong people, and delays in remediation. Responsible disclosure and patch management are assured through the PTES reporting framework.

37
New cards

Ethics: Ethical use of social engineering

Vishing or pretexting may distress staff, extract sensitive information, and reduce trust. Human-factor risk assessment must be considered when gathering information through these means. Phase 2 helps ethical hackers to set ethical boundaries and consent-based reconnaissance.

38
New cards

Ethics: Controlled exploitation without causing harm

Exploitation attacks could crash systems and/or corrupt data.

39
New cards

Ethics: Ensuring no persistent access remains

40
New cards

Ethics: Maintaining staff trust and professional conduct

Explore top notes

note
Implications of wider issue
Updated 611d ago
0.0(0)
note
The German Revolution (1918-1919)
Updated 842d ago
0.0(0)
note
Chapter 20: Carbohydrates
Updated 1267d ago
0.0(0)
note
Traditional Music (AQA)
Updated 633d ago
0.0(0)
note
Transport in Plants
Updated 899d ago
0.0(0)
note
Implications of wider issue
Updated 611d ago
0.0(0)
note
The German Revolution (1918-1919)
Updated 842d ago
0.0(0)
note
Chapter 20: Carbohydrates
Updated 1267d ago
0.0(0)
note
Traditional Music (AQA)
Updated 633d ago
0.0(0)
note
Transport in Plants
Updated 899d ago
0.0(0)