Biomedical Engineering Reference
In-Depth Information
Figure 22.2
Vision for a new cloud-based shared architecture
functionality, performance and, above all, security are not compromised.
This new vision is shown in Figure 22.2, where the services are hosted
and maintained by a third-party vendor.
Pistoia chose an open source suite of software that is well known in the
bioinformatics world as its test software for the proof of concept work.
Before starting there were discussions with the institute that wrote the
software, building an agreement to communicate the results of the project
and, in particular, share any recommendations or security vulnerabilities
that were discovered.
In order to test and maintain security a number of approaches were
taken. The fi rst was to run an extensive ethical hack of the chosen open
source software. Pistoia did this by employing the professional services of
a global IT company with a specialist security division, producing an
extensive report containing a breakdown of vulnerabilities. Although
I cannot list specifi c security issues found in the Pistoia project, I would
like to highlight the most common vulnerabilities found in such
￿ ￿ ￿ ￿ ￿
 
Search WWH ::




Custom Search