chapter 12 by lisa reeves bertin securing information in a network
TRANSCRIPT
![Page 1: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/1.jpg)
Chapter 12by Lisa Reeves Bertin
Securing Information in a Network
![Page 2: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/2.jpg)
Key Terms Defined
• Acceptable Use• Antivirus Software• Authentication• Biometrics
![Page 3: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/3.jpg)
Key Terms Defined
• Confidentiality • Copyright• Fair Use• Firewall
![Page 4: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/4.jpg)
Key Terms Defined
• Flash Drive • Hacker • Integrity• Intrusion Detection Devices
![Page 5: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/5.jpg)
Key Terms Defined
• Intrusion Detection System • Jump Drive• Malicious Code• Malicious Insider
![Page 6: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/6.jpg)
Key Terms Defined
• Mask• Network• Network Accessibility• Network Availability
![Page 7: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/7.jpg)
Key Terms Defined
• Network Security• Password• Proxy server• Radio Frequency Identity Chip
![Page 8: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/8.jpg)
Key Terms Defined
• Secure Information • Security Breach• Shoulder Surfing• Social engineering
![Page 9: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/9.jpg)
Key Terms Defined
• Spyware• Thumb Drive• Trojan Horse• Virus • Worm
![Page 10: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/10.jpg)
Fair Use of Information and Sharing
• Understanding Copyright Laws• Copyright Laws cover multiple items• Being aware of restrictions• Use of Backup Copies
![Page 11: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/11.jpg)
Fair Use of Information and Sharing
• Technology Advances• Illegal Internet Activity• Internet Access and Health Care
Organizations
![Page 12: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/12.jpg)
Securing Network Information
• Linking of Computers Together• Three Main Areas of Secure Network
Information• The Risks of Shoulder Surfing• Implementing Acceptable Use Policy
![Page 13: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/13.jpg)
Securing Network Information
• Building Employee Confidence • Organizations Roles in Policy• Employee Authentication• Policy Enforcement
![Page 14: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/14.jpg)
Authentication of Users
• The Role of ID Cards• Available Devices• Level of Security Needed Dictates
Authentication
![Page 15: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/15.jpg)
Threats to Security
• Computing Technology Industry Association • The First Line of Defense• Security Measures• Limited Authorization
![Page 16: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/16.jpg)
Threats to Security
• Additional Precautions • Corporate Network Threats • The Use of Spyware• “Cookies”
![Page 17: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/17.jpg)
Threats to Security
• The Negative of “Cookies”• Spyware• A Threat to Corporate Security• Malicious Insiders
![Page 18: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/18.jpg)
Threats to Security
• Tracking Employee Activity • The Staffing Needs to Keep up With
Security
![Page 19: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/19.jpg)
Security Tools
• Tools to Protect the Organizational Network
• Needed Security Tools • E-mail Software• IM Software and Spam Mail Filters
![Page 20: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/20.jpg)
Security Tools
• Firewalls• Why Proxy Servers?• What do Proxy Servers do?
![Page 21: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/21.jpg)
Offsite Use of Portable Devices
• Off Site Uses of Portable Devices • Virtual Private Network• What a VPN does• What is Essential Data
![Page 22: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/22.jpg)
Offsite Use of Portable Devices
• Who is Responsible for Meeting Requirements?
• Lost or Stolen Devices • The Department of Health and Human
Services (2006)
![Page 23: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/23.jpg)
Thought Provoking Questions
1. Jean, a diabetes nurse educator recently read an article in an online journal that she accessed through her health agency’s database subscription. The article provided a comprehensive checklist for managing diabetes in older adults that she prints and distributes to her patients in a diabetes education class. Does this constitute fair use or is this a copyright violation?
![Page 24: Chapter 12 by Lisa Reeves Bertin Securing Information in a Network](https://reader034.vdocument.in/reader034/viewer/2022051401/56649e765503460f94b77c36/html5/thumbnails/24.jpg)
Thought Provoking Questions2. Sue is a COPD clinic nurse enrolled in a Master’s
education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated re-hospitalization of COPD patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that since she is a nurse and needs this information for a graduate school assignment that she is entitled to the information. Is Sue correct in her thinking?