Date post: | 29-Dec-2015 |
Category: |
Documents |
Upload: | amos-knight |
View: | 218 times |
Download: | 1 times |
Chapter 12by Lisa Reeves Bertin
Securing Information in a Network
Key Terms Defined
• Acceptable Use• Antivirus Software• Authentication• Biometrics
Key Terms Defined
• Confidentiality • Copyright• Fair Use• Firewall
Key Terms Defined
• Flash Drive • Hacker • Integrity• Intrusion Detection Devices
Key Terms Defined
• Intrusion Detection System • Jump Drive• Malicious Code• Malicious Insider
Key Terms Defined
• Mask• Network• Network Accessibility• Network Availability
Key Terms Defined
• Network Security• Password• Proxy server• Radio Frequency Identity Chip
Key Terms Defined
• Secure Information • Security Breach• Shoulder Surfing• Social engineering
Key Terms Defined
• Spyware• Thumb Drive• Trojan Horse• Virus • Worm
Fair Use of Information and Sharing
• Understanding Copyright Laws• Copyright Laws cover multiple items• Being aware of restrictions• Use of Backup Copies
Fair Use of Information and Sharing
• Technology Advances• Illegal Internet Activity• Internet Access and Health Care
Organizations
Securing Network Information
• Linking of Computers Together• Three Main Areas of Secure Network
Information• The Risks of Shoulder Surfing• Implementing Acceptable Use Policy
Securing Network Information
• Building Employee Confidence • Organizations Roles in Policy• Employee Authentication• Policy Enforcement
Authentication of Users
• The Role of ID Cards• Available Devices• Level of Security Needed Dictates
Authentication
Threats to Security
• Computing Technology Industry Association • The First Line of Defense• Security Measures• Limited Authorization
Threats to Security
• Additional Precautions • Corporate Network Threats • The Use of Spyware• “Cookies”
Threats to Security
• The Negative of “Cookies”• Spyware• A Threat to Corporate Security• Malicious Insiders
Threats to Security
• Tracking Employee Activity • The Staffing Needs to Keep up With
Security
Security Tools
• Tools to Protect the Organizational Network
• Needed Security Tools • E-mail Software• IM Software and Spam Mail Filters
Security Tools
• Firewalls• Why Proxy Servers?• What do Proxy Servers do?
Offsite Use of Portable Devices
• Off Site Uses of Portable Devices • Virtual Private Network• What a VPN does• What is Essential Data
Offsite Use of Portable Devices
• Who is Responsible for Meeting Requirements?
• Lost or Stolen Devices • The Department of Health and Human
Services (2006)
Thought Provoking Questions
1. Jean, a diabetes nurse educator recently read an article in an online journal that she accessed through her health agency’s database subscription. The article provided a comprehensive checklist for managing diabetes in older adults that she prints and distributes to her patients in a diabetes education class. Does this constitute fair use or is this a copyright violation?
Thought Provoking Questions2. Sue is a COPD clinic nurse enrolled in a Master’s
education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated re-hospitalization of COPD patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that since she is a nurse and needs this information for a graduate school assignment that she is entitled to the information. Is Sue correct in her thinking?