Use Case #2
USE CASE #2
Cyber security for connected medical devices and mobile applications
Aim: To validate SECANT’s efficiency to deal with cascading effects of cyber threats and with propagated
vulnerabilities in connected healthcare infrastructures, as well as in remote healthcare settings.
Scenario to be demonstrated: Scenario to be demonstrated: This pilot use case involves the installation of the SECANT platform in the servers
of KI’s LIME (Learning, Informatics, Management and Ethics) Department, which is one of Europe’s premier
medical research institutes with strong collaboration with other hospitals and medical institutes in Northern Europe.
KI’s LIME Department provides access to mobile applications and systems that are hosted in the LIME servers, and
which are tasked with collecting information and medical data from different groups of patients of the Danderyd
Hospital in Stockholm for research purposes. More specifically, the first one is a mobile health research system that
enriches the follow up information coming from various medical devices regarding patients diagnosed with cancer
in order to support methodological and clinical studies on patient reported outcomes such as Quality of Life (QoL),
well-being, symptoms and satisfaction with care in different diagnoses and settings.

The second system, called
Clinical Expert Operating System (CLEOS, https://cleos.ki.se) is a primary care clinical collection system. CLEOS
automates the collection of follow-up patient data regarding known active medical problems, and standardizes the
evaluation of the outcomes reported by the
patients by using appropriate laboratory
measurements. In this pilot, the various
modules of the SECANT platform depicted
in Figure 1-8 will be tested for their efficacy
in (i) identifying and isolating software
vulnerabilities in the LIME ecosystem and
(ii) in securing the whole lifecycle of
research-based healthcare applications and
systems and data collection-storing-sharing,
while enriching the knowledge in designing
security software and forming security
practices on developing and implementing
software and hardware components. PUC2
will also validate the ability of SECANT’s
Threat Intelligence Collection Module in
capturing cybersecurity threats, incidents and
anomaly traces.
Sign up for SECANT Newsletter

This project has received funding from the European Union’s Horizon 2020
Research and Innovation programme under grant agreement No. 101019645.
Disclaimer
The content of this website reflects the Secant consortium view and the European Commission (or its delegated Agency INEA) is not responsible for any use that may be made of the information it contains