Skip to main content
. 2020 Oct 29;33(6):1527–1542. doi: 10.1007/s10278-020-00393-3

Table 1.

Summary of cybersecurity mitigation measures proposed in literature. CIA, confidentiality, integrity, availability

Mitigation measure User/vendor CIA triad References
Physical mitigation measures (Physical Mitigation Measuressection)
  Keep file servers in secure areas safeguarded from unauthorized access and environmental threats U (CIA) [13, 14, 23]
install security cameras in server rooms U (CIA) [24]
Technical mitigation measures (Technical Mitigation Measuressection)
  Perform regular backups U/V A [2, 13, 23, 25]
  Use firewalls and network segmentation to prevent network intrusion U (CIA) [5, 13, 23, 26, 2931]
  Disable unused physical network and USB ports U (CIA) [20, 25]
  Use whitelisting for permitted applications U/V (CIA) [18, 25]
  Implement user authentication and define and enforce access rights U/V C [13, 14, 23, 32, 66]
  Install updates and patches on a regular basis U/V (CIA) [5, 13, 25]
  Install antivirus software U/V (CIA) [5, 18, 23, 25]
  Use encrypted network transmissions U/(V) CI [5, 18, 20]
  Use encrypted document storage U/V CI [5, 18, 20]
  Deploy an audit trail U/V (CI) [13, 14, 20, 33, 34]
  Deploy network monitoring and intrusion detection tools U (CIA) [5, 25, 35]
  Define and enforce a mobile device policy U (CIA) [5, 13, 14, 23]
  Deploy automated asset inventory discovery tools U (CIA) [5]
  Ensure that system configurations are updated to remain secure over time U/V (CIA) [5, 21]
  Deploy a public key infrastructure providing client certificates U/V CI [5, 65]
  Enforce remote administration to be performed over secure channels U C [5, 36]
Organizational mitigation measures (Organizational Mitigation Measuressection)
  Perform regular user training and simulate cybersecurity incidents U (CIA) [5, 12, 13, 25]
  Perform regular penetration testing U (CIA) [20]
  Define and implement incident management procedures U (CIA) [6, 13, 25]
Medical imaging specific mitigation measures (Cybersecurity in PACS and Medical Imagingsection)
  Use de-identified images where possible U/V C [34, 4346]
  Implement DICOM transport security or selective encryption of DICOM headers U/(V) C [4852]
  Store DICOM files in encrypted format U/V C [34, 53]
  Use digital signatures or watermarking techniques to protect image integrity U/V I [48, 50, 5760]
  Cleanse file preamble when handling DICOM files U/V (CIA) [61, 62, 64]