OBJECTIVE. As health care moves into a new era of increasing information vulnerability, radiologists should understand that they may be using systems that are exposed to altered data or data that contain malicious elements. This article explains the vulnerabilities of DICOM images and discusses requirements to properly secure these images from cyberattacks. CONCLUSION. There is an important need to properly secure DICOM images from attacks and tampering. The solutions described in this article will go a long way to achieving this goal.
Keywords: DICOM; confidentiality; encryption; integrity; mitigation; security; vulnerabilities.