
Cybersecurity
20 Instructions for use – Infinity® M300 and M300+ series – VG3.0
Definition of cybersecurity terminology
The following table lists the cybersecurity terms used in the instructions for use or displayed on the
M300/M300+ and/or ICS.
Term Description
ACS Application Control Service. ACS is a Dräger-specific network func-
tionality that allows remote control over the network or a patient moni-
tor.
Denial of service A situation where intended services or functions cannot be accessed
due to unavailable resource. It is usually caused by excess resource
consumption.
DSCP Differentiated Services (DiffServ) value set in an IP packet for classifi-
cation and management. DSCP is part of a Quality of Service (QoS)
implementation.
Legacy mode Disabled security protocol without authenticated and encrypted com-
munication between devices. Legacy mode is a non-preferred mode of
operation in which devices can operate without secure communica-
tions. When selected, authentication, integrity protection, and encryp-
tion will not be used for data in motion between devices on the Infinity
network.
Man-in-the-middle attack A type of security compromise where a third-party positions itself in the
communication path between two or more entities. It usually compro-
mises one or more of data authenticity, integrity and confidentiality.
Packet storm An excessive amount of traffic on a computer network. The network
congestion can delay or inhibit network communication between devic-
es. A packet storm could cause latency, potentially preventing network
communications between devices. It could also cause excessive load
on devices as they attempt to manage the adverse condition.
PDS Patient Data Service. PDS is a Dräger-specific network functionality
that allows physiological patient data to be transferred across a net-
work for other entities to consume.
PIN Personal Identification Number.
PSK Pre-shared Key. A PSK is a shared confidential phrase, code, or key
used as a credential to mutually authenticate the peers.
Secure mode A security protocol that enables authenticated and encrypted commu-
nication between devices. Secure mode is a preferred mode of opera-
tion in which devices operate with protected communication. This im-
plementation provides mutual authentication, integrity protection, and
encryption for data in motion between devices on the Infinity network.
Spoofing A situation when another entity identifies as a third-party by falsifying
authentication information. Strong authentication mitigates spoofing
attacks.