Appendix A List of Acronyms

AD

Active Directory

AES

Advanced Encryption Standard

AE Title

Application Entity Title

CA

Certificate Authority

CIDR

Classless Inter-Domain Routing

CPU

Central Processing Unit

CSR

Certificate Signing Request

DB

Database

DC

Domain Controller

DCS:SA

Data Center Security: Server Advanced

DHCP

Dynamic Host Configuration Protocol

DICOM

Digital Imaging and Communications in Medicine

DNS

Domain Name System

EDR

Endpoint Detection and Response

FMC

Firepower Management Center

FTD

Firepower Threat Defense

GB

gigabyte

GUI

Graphical User Interface

HD

Hard Drive

HDO

Healthcare Delivery Organization

HIP

Host Identity Protocol

HL7

Health Level 7

http

Hypertext Transfer Protocol

https

Hyper Text Transfer Protocol Secure

IDN

Identity Defined Networking

IIS

Internet Information Services

IoT

Internet of Things

IP

Internet Protocol

IPv4

Internet Protocol Version 4

ISO

International Organization for Standardization

IT

Information Technology

LDAP

Lightweight Directory Access Protocol

MB

Megabyte

MPPS

Modality Performed Procedure Step

NAT

Network Address Translation

NCCoE

National Cybersecurity Center of Excellence

NIST

National Institute of Standards and Technology

NTP

Network Time Protocol

OS

Operating System

OVA

Open Virtual Appliance or Application

OVF

Open Virtualization Format

PACS

Picture Archiving and Communication System

PKCS

Public Key Cryptography Standards

PKI

Public Key Infrastructure

QR Code

Quick Response Code

RAM

Random Access Memory

RIS

Radiology Information System

SCP

Service Class Provider

SEP

Symantec Endpoint Protection

SEPM

Symantec Endpoint Protection Manager

SMS

Short Message Service

SP

Special Publication

SQL

Structured Query Language

SSL/TLS

Secure Sockets Layer/Transport Layer Security

TCP/IP

Transmission Control Protocol/Internet Protocol

UDM

Universal Data Manager

UDP

User Datagram Protocol

URL

Uniform Resource Locator

VIP

Validation and ID Protection

VLAN

Virtual Local Area Network

VM

Virtual Machine

VNA

Vendor Neutral Archive

WAN

Wide Area Network

WLM

Workload Management

Appendix B References

C1

Docker. Install Docker Desktop on Windows. Available: https://docs.docker.com/docker-for-windows/install/.

C2

Microsoft Docs. Install SQL Server from the Installation Wizard (Setup). Available: https://docs.microsoft.com/en-us/sql/database-engine/install-windows/install-sql-server-from-the-installation-wizard-setup?view=sql-server-2017.

C3

K. McKay and D. Cooper, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-52 Revision 2, NIST, Gaithersburg, Md., Aug. 2019. Available: https://doi.org/10.6028/NIST.SP.800-52r2.

C4

DVTk. DVTk open source project main contributors ICT Group and Philips. Available: https://www.dvtk.org/.

C5

Microsoft TechNet. Building Your First Domain Controller on 2012 R2. Available: https://social.technet.microsoft.com/wiki/contents/articles/22622.building-your-first-domain-controller-on-2012-r2.aspx.

C6

Microsoft TechNet. Installing and Configuring DHCP role on Windows Server 2012. Available: https://blogs.technet.microsoft.com/teamdhcp/2012/08/31/installing-and-configuring-dhcp-role-on-windows-server-2012/.

C7

DigiCert. CSR Creation Instructions for Microsoft Servers. Available: https://www.digicert.com/util/csr-creation-microsoft-servers-using-digicert-utility.htm.

C8

Cisco. Cisco Firepower Management Center Virtual for VMware Deployment Quick Start Guide. Available: https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/fmcv/FMCv-quick.html.

C9

Cisco. Cisco Firepower Threat Defense Virtual for VMware Getting Started Guide. Available: https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/ftdv/ftdv-vmware-gsg.html.

C10

Cisco Systems, Inc. Basic Policy Creation for Firepower. Jan. 30, 2019. Available: https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/Basic_Policy_Creation_on_Cisco_Firepower_Devices.pdf.

C11

Cisco Systems, Inc. Cisco Stealthwatch: Installation and Configuration Guide 7.0. 2019. Available: https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/system_installation_configuration/SW_7_0_0_Installation_and_Configuration_Guide_DV_3_1.pdf.

C12

G. O’Brien et al., Securing Wireless Infusion Pumps in Healthcare Delivery Organizations, NIST SP 1800-8, NIST, Gaithersburg, Md., Aug. 2018. Available: https://www.nccoe.nist.gov/sites/default/files/library/sp1800/hit-wip-nist-sp1800-8.pdf.

C13

Microsoft. Storage Account Overview. Available: https://docs.microsoft.com/en-us/azure/storage/common/storage-account-overview?toc=/azure/storage/blobs/toc.json.

C14

TDi Technologies, External Authentication libraries, ConsoleWorks Cybersecurity Operations Platform. Available: https://support.tditechnologies.com/content/external-authentication-libraries.