Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
by
Goebel, Mat
, Tully, Jeffrey
, Dameff, Christian
in
Automatic number identification
/ Call centers
/ Computer Security - standards
/ Confidentiality
/ Cybersecurity
/ Cyberterrorism
/ Deafness
/ Emergencies
/ Emergency Medical Service Communication Systems - standards
/ Emergency medical services
/ Emergency Medical Services - standards
/ Emergency Service, Hospital - standards
/ Emergency services
/ Hacking
/ Health services
/ Humans
/ Infrastructure
/ Infrastructure (Economics)
/ Internet
/ Location based services
/ Mobile phones
/ Patients
/ Public safety
/ Service introduction
/ Software
/ Technology
/ Telecommunications towers
/ Telephone companies
/ Telephone numbers
/ Telephones
/ Viewpoint
2019
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
by
Goebel, Mat
, Tully, Jeffrey
, Dameff, Christian
in
Automatic number identification
/ Call centers
/ Computer Security - standards
/ Confidentiality
/ Cybersecurity
/ Cyberterrorism
/ Deafness
/ Emergencies
/ Emergency Medical Service Communication Systems - standards
/ Emergency medical services
/ Emergency Medical Services - standards
/ Emergency Service, Hospital - standards
/ Emergency services
/ Hacking
/ Health services
/ Humans
/ Infrastructure
/ Infrastructure (Economics)
/ Internet
/ Location based services
/ Mobile phones
/ Patients
/ Public safety
/ Service introduction
/ Software
/ Technology
/ Telecommunications towers
/ Telephone companies
/ Telephone numbers
/ Telephones
/ Viewpoint
2019
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
by
Goebel, Mat
, Tully, Jeffrey
, Dameff, Christian
in
Automatic number identification
/ Call centers
/ Computer Security - standards
/ Confidentiality
/ Cybersecurity
/ Cyberterrorism
/ Deafness
/ Emergencies
/ Emergency Medical Service Communication Systems - standards
/ Emergency medical services
/ Emergency Medical Services - standards
/ Emergency Service, Hospital - standards
/ Emergency services
/ Hacking
/ Health services
/ Humans
/ Infrastructure
/ Infrastructure (Economics)
/ Internet
/ Location based services
/ Mobile phones
/ Patients
/ Public safety
/ Service introduction
/ Software
/ Technology
/ Telecommunications towers
/ Telephone companies
/ Telephone numbers
/ Telephones
/ Viewpoint
2019
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
Journal Article
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
2019
Request Book From Autostore
and Choose the Collection Method
Overview
9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of the 9-1-1 call-taking system and to describe its vulnerabilities that could lead to compromised patient care. 9-1-1 calls answered from mobile phones and landlines use a variety of technologies to provide information about caller location and other information. These interconnected technologies create potential cyber vulnerabilities. A variety of attacks could be carried out on 9-1-1 infrastructure to various ends. Attackers could target individuals, groups, or entire municipalities. These attacks could result in anything from a nuisance to increased loss of life in a physical attack to worse overall outcomes owing to delays in care for time-sensitive conditions. Evolving 9-1-1 systems are increasingly connected and dependent on network technology. As implications of cybersecurity vulnerabilities loom large, future research should examine methods of hardening the 9-1-1 system against attack.
Publisher
Journal of Medical Internet Research,Gunther Eysenbach MD MPH, Associate Professor,JMIR Publications
This website uses cookies to ensure you get the best experience on our website.