+ All Categories
Home > Documents > Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Date post: 29-Dec-2015
Category:
Upload: amos-knight
View: 218 times
Download: 1 times
Share this document with a friend
Popular Tags:
24
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network
Transcript
Page 1: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Chapter 12by Lisa Reeves Bertin

Securing Information in a Network

Page 2: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Acceptable Use• Antivirus Software• Authentication• Biometrics

Page 3: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Confidentiality • Copyright• Fair Use• Firewall

Page 4: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Flash Drive • Hacker • Integrity• Intrusion Detection Devices

Page 5: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Intrusion Detection System • Jump Drive• Malicious Code• Malicious Insider

Page 6: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Mask• Network• Network Accessibility• Network Availability

Page 7: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Network Security• Password• Proxy server• Radio Frequency Identity Chip

Page 8: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Secure Information • Security Breach• Shoulder Surfing• Social engineering

Page 9: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Key Terms Defined

• Spyware• Thumb Drive• Trojan Horse• Virus • Worm

Page 10: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Fair Use of Information and Sharing

• Understanding Copyright Laws• Copyright Laws cover multiple items• Being aware of restrictions• Use of Backup Copies

Page 11: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Fair Use of Information and Sharing

• Technology Advances• Illegal Internet Activity• Internet Access and Health Care

Organizations

Page 12: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Securing Network Information

• Linking of Computers Together• Three Main Areas of Secure Network

Information• The Risks of Shoulder Surfing• Implementing Acceptable Use Policy

Page 13: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Securing Network Information

• Building Employee Confidence • Organizations Roles in Policy• Employee Authentication• Policy Enforcement

Page 14: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Authentication of Users

• The Role of ID Cards• Available Devices• Level of Security Needed Dictates

Authentication

Page 15: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Threats to Security

• Computing Technology Industry Association • The First Line of Defense• Security Measures• Limited Authorization

Page 16: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Threats to Security

• Additional Precautions • Corporate Network Threats • The Use of Spyware• “Cookies”

Page 17: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Threats to Security

• The Negative of “Cookies”• Spyware• A Threat to Corporate Security• Malicious Insiders

Page 18: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Threats to Security

• Tracking Employee Activity • The Staffing Needs to Keep up With

Security

Page 19: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Security Tools

• Tools to Protect the Organizational Network

• Needed Security Tools • E-mail Software• IM Software and Spam Mail Filters

Page 20: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Security Tools

• Firewalls• Why Proxy Servers?• What do Proxy Servers do?

Page 21: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Offsite Use of Portable Devices

• Off Site Uses of Portable Devices • Virtual Private Network• What a VPN does• What is Essential Data

Page 22: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Offsite Use of Portable Devices

• Who is Responsible for Meeting Requirements?

• Lost or Stolen Devices • The Department of Health and Human

Services (2006)

Page 23: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Thought Provoking Questions

1. Jean, a diabetes nurse educator recently read an article in an online journal that she accessed through her health agency’s database subscription. The article provided a comprehensive checklist for managing diabetes in older adults that she prints and distributes to her patients in a diabetes education class. Does this constitute fair use or is this a copyright violation?

Page 24: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Thought Provoking Questions2. Sue is a COPD clinic nurse enrolled in a Master’s

education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated re-hospitalization of COPD patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that since she is a nurse and needs this information for a graduate school assignment that she is entitled to the information. Is Sue correct in her thinking?


Recommended