1/39
Challenges Faced + Ethics for IBCS M26
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Focus of White Box Testing
Internal workings, code logic, structure.
White Tester Knowledge
Requires deep understanding of the codebase.
Approach of White Box
Code paths, branches, logic.
Tools/methods of White Box
Code review, unit testing, path testing.
Advantages of White Box Testing
Helps identify logical errors and code vulnerabilities. Better code optimisation and thoroughness achieving a high code coverage. Can be easily automated for uninterrupted service delivery.
Disadvantages of White Box Testing
Requires extensive coding expertise and time. Can be expensive to conduct. Does not reflect experiences on the user-level. High maintenance and inability to detect requirements that aren’t implemented already.
Use case of White Box Testing
Debugging and verifying the logic of critical code. Used to verify interaction between code units and how data is handled in an application.
Suitability of White Box Testing
Offers more depth and precision than other test methods. Governance needs to be strict as this method can be invasive and PHIs are at risk.
Focus of Black Box Testing
Functionality and end-user experience.
Black Box Tester Knowledge
No knowledge of internal code structure or implementation.
Approach of Black Box
Testers validate the system against requirements.
Tools/methods of Black Box Testing
Functional testing, regression testing (re-running functional/non-functional tests to ensure modifications to code haven’t affected software performance), UI testing.
Advantages of Black Box Testing
Simulates real user and malicious hacker behaviour, unbiased testing. Finds weakest part of system from a hacker POV.
Disadvantages of Black Box Testing
With limited knowledge, there is a risk of harming the system and jeopardising continued service. Especially in the IoMT with a possible compromise to the interconnectedness of the system.
Use Case of Black Box Testing
Testing UI and overall system behaviour. Holistic approach
Suitability of Black Box testing
Less suitable for hospital settings due to higher disruption risk.
Focus of Grey Box Testing
Combination of functionality and some internal code logic. Authentication, input validation, weak or missing Role Based Access Control (RBAC - end-user access authorisation) checks.
Tester knowledge of Grey Box Testing
Partial understanding. Insider threat or external hacker with some insider information.
Approach of Grey Box
Testers leverage limited system knowledge to design tests for a healthcare system. Conducted in controlled environment.
Tools/methods of Grey Box
Burp Suite, OWASP ZAP, manual inspection
Advantages of Grey Box Testing
Balanced approach. Wider coverage than other testing methods. More efficient use of resources as plans are better tailored with partial knowledge while not being incredibly comprehensive.
Disadvantages of Grey Box Testing
Dependent on partial knowledge. Can be difficult to test complex cases. Hard to trace root of bugs without knowledge of source code.
Suitability of Grey Box testing
More suitable for live hospital networks requiring uninterrupted service delivery
Extension: In-class discussion on Healthcare Application Case Study
Identifying real-world attack scenarios. Exposed vulnerabilities in low-level user-access (receptionists) and authentication. No direct exploits found, but many issues with security headers and low protection from brute-force exploitation. Exposed internal structures —> could be further explored with white-box testing.
Evaluation of testing methods.
Best is grey box. While not as thorough, allows for inspection of front-end vulnerabilities and more in-depth analysis for later exploits in response plan. Also simulates most realistic hacker perspective.
Why is penetration testing is important in healthcare?
Heatlhcare keeps a lot of medical data online now
A data breach is costly, averaging over $10 million over incident (2024 IBM report).
Operational Continuity
Patient data needs to be completely secure and stay that way since it is a constant target.
Encryption
Add additional layers of encryption such as biometric authentication or MFA to protet patient data.
Staff Training during vulnerability testing
Helps staff know what is out of order during the PTES to stop any issues and continue to work as smoothly as possible.
Emergency Procedures
Developing clear and actionable guidelines for potential disruptions i.e. isolating systems and maintaining communication.
Back-up infrastructure
Implements redundancy for critical systems (off-site back-ups, cloud storage, secondary servers) to maintain OC while testing and in case of breach. Minimises potential downtime.
Why uninterrupted service delivery is important
Patient safety/life-critical services
Continuus access to EHRs and clinical systems
Avoiding disruption to hospital operations
Maintaining trust of healthcare services
Ethics: Proper Authorisation
Unapproved testing could breach hospital policy, violate regulations, impact systems. Phase 1 creates an audit trail establishing written authorisation.
Ethics: Data confidentiality and integrity
Exposure, modification, and the leaking of hospital data is at risk when scanning or exploitation takes place. Phase 2 and 4-6 handle this, helping to define rules around data and enforce safe, controlled exploitation and post-exploitation.
Ethics: Non-disruption of services
Testing may interrupt IoMT, internal communications, and patient monitoring, putting patients at risk. Phase 1 puts systems in place to identify “no-touch” systems, testing windows, and critical assets. This plans for business continuity and disaster recovery plans.
Ethics: Reporting and Responsiveness
Poor reporting in Phase 7 could lead to miscommunication, vulnerabilities being exposed to the wrong people, and delays in remediation. Responsible disclosure and patch management are assured through the PTES reporting framework.
Ethics: Ethical use of social engineering
Vishing or pretexting may distress staff, extract sensitive information, and reduce trust. Human-factor risk assessment must be considered when gathering information through these means. Phase 2 helps ethical hackers to set ethical boundaries and consent-based reconnaissance.
Ethics: Controlled exploitation without causing harm
Exploitation attacks could crash systems and/or corrupt data.
Ethics: Ensuring no persistent access remains
Ethics: Maintaining staff trust and professional conduct