logo

Information Security Course 2022

   

Added on  2022-08-21

9 Pages2098 Words37 Views
Running head: INFORMATION SECURITY
Information Security in a world of Technology
Name
ID
Course
Unit lecturer
Date
Information  Security Course 2022_1
INFORMATION SECURITY 2
Introduction
One of the fields that is growing day and night is the field of information technology. Despite
having the positive advances in the field, there are negative issues evident in the field. For
example, the constant hacking activities. However, hospital have been the area of target for many
hackers. The main goal of this assignment is to elaborate how organizations can protect patients’
information through the following mechanisms:
Security mechanisms
According to Baskerville, (2018), security mechanisms refers to the strategies that the
organization put in place within the computers that they use to protect patients’ information. The
first security strategy is to install antivirus software in their machines. Many hackers make use of
viruses to phish patients’ data from the computer. However, there are antiviruses which include a
vast and Bitdefender that can immunize the computer and notify the user. The effect of viruses
are severe. Some of the effects include deleting file from the organization machines. The second
security mechanism is use of computer firewall. Firewall can be software or hardware. The
purpose of the firewall is to prevent unauthorized access to the organization network. Entry of
unauthorized users may put at risk the user data. There are cases where the hackers can take
advantage of the unupdated software or operating systems of the machines in the organization.
The best security procedure in this scenario is to keep the operating systems updated according
to Biswas & Muthukkumarasamy, (2016). Most of the updated software comes with security
mechanisms that is difficult to outdo. Despite updating the systems, hackers also study the latest
trend on how to get other people’s data. Therefore, another security strategy is to insist on
encryption. Encryption refers to the act of hiding the meaning of the data that two people are
sharing. The act will prevent leak of the information by denying the hackers the real meaning of
Information  Security Course 2022_2
INFORMATION SECURITY 3
the information. The last security strategy is ensuring that the healthcare organization back up
their data from the main sources of the data. The reason for the backup is that there are cases
where the hacker may deny the organization access to their data. However, backup is an
alternative during a loss.
Administrative and personnel issues
Administrative and personnel issues refers to the way the management of the health organization
carry out themselves to ensure that the patients’ data do not get to the wrong hands. The first
administrative strategy is to create awareness to the employees of the health organization about
the existence of the hackers. For example, the administration should make the employees aware
of the spam emails that they will be receiving on daily basis. These spam emails are ways to
phish out the patients data from the health organization. However, it is important for the workers
to know that these emails come from hackers and they should not open them anytime. The
second personnel issue is how the organization purchase software and recruit their employees.
For instance, there are cases where the software that come the organization come with viruses
according to Mahdi, Alhabbash & Naser, (2016). The administration need to take care on how
they purchase the software. Another issue is about the workers employed to operate on the
patient’s data. These workers must be loyal to the organization. The administration should ensure
that their integrity is not questionable and they cannot engage in any malicious act. For example
selling out the data to unauthorized user. Personnel issues deals with how the administration
respond to the critical issues that happen in the organization. For example, when there is loss of
data or breach in security. There should be well placed mechanism that deal with such losses.
These strategies should aim at satisfying the customer and ensuring that they are guaranteed of
their privacy. Taking part in legal business or action is another approach. No one can agree that
Information  Security Course 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Managing Health Care Information System
|10
|2386
|139

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193

Cyber Security Management
|14
|2652
|374

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164