Skip to main content
. 2020 Jun 10;20:106. doi: 10.1186/s12911-020-01145-7

Table 7.

Examples of ASP estimates [51, 52]

Attack Elapsed time Expertise Knowledge of system Window of opportunity Equipment Required attack potential
Sum Rating
Leakage of patient information from telemedicine device 0 6 7 4 4 21 High
Forgery via wiretapping and spoofing 0 3 0 4 4 11 Moderate
MITM attacks using rogue AP 0 6 3 10 4 23 High
Health information sniffing 0 0 0 4 4 8 Basic