Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Similar presentations


Presentation on theme: "Chapter 12 by Lisa Reeves Bertin Securing Information in a Network."— Presentation transcript:

1 Chapter 12 by Lisa Reeves Bertin Securing Information in a Network

2 Key Terms Defined Acceptable Use Antivirus Software Authentication Biometrics

3 Key Terms Defined Confidentiality Copyright Fair Use Firewall

4 Key Terms Defined Flash Drive Hacker Integrity Intrusion Detection Devices

5 Key Terms Defined Intrusion Detection System Jump Drive Malicious Code Malicious Insider

6 Key Terms Defined Mask Network Network Accessibility Network Availability

7 Key Terms Defined Network Security Password Proxy server Radio Frequency Identity Chip

8 Key Terms Defined Secure Information Security Breach Shoulder Surfing Social engineering

9 Key Terms Defined Spyware Thumb Drive Trojan Horse Virus Worm

10 Fair Use of Information and Sharing Understanding Copyright Laws Copyright Laws cover multiple items Being aware of restrictions Use of Backup Copies

11 Fair Use of Information and Sharing Technology Advances Illegal Internet Activity Internet Access and Health Care Organizations

12 Securing Network Information Linking of Computers Together Three Main Areas of Secure Network Information The Risks of Shoulder Surfing Implementing Acceptable Use Policy

13 Securing Network Information Building Employee Confidence Organizations Roles in Policy Employee Authentication Policy Enforcement

14 Authentication of Users The Role of ID Cards Available Devices Level of Security Needed Dictates Authentication

15 Threats to Security Computing Technology Industry Association The First Line of Defense Security Measures Limited Authorization

16 Threats to Security Additional Precautions Corporate Network Threats The Use of Spyware “Cookies”

17 Threats to Security The Negative of “Cookies” Spyware A Threat to Corporate Security Malicious Insiders

18 Threats to Security Tracking Employee Activity The Staffing Needs to Keep up With Security

19 Security Tools Tools to Protect the Organizational Network Needed Security Tools E-mail Software IM Software and Spam Mail Filters

20 Security Tools Firewalls Why Proxy Servers? What do Proxy Servers do?

21 Offsite Use of Portable Devices Off Site Uses of Portable Devices Virtual Private Network What a VPN does What is Essential Data

22 Offsite Use of Portable Devices Who is Responsible for Meeting Requirements? Lost or Stolen Devices The Department of Health and Human Services (2006)

23 Thought Provoking Questions 1. Jean, a diabetes nurse educator recently read an article in an online journal that she accessed through her health agency’s database subscription. The article provided a comprehensive checklist for managing diabetes in older adults that she prints and distributes to her patients in a diabetes education class. Does this constitute fair use or is this a copyright violation?

24 Thought Provoking Questions 2. Sue is a COPD clinic nurse enrolled in a Master’s education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated re-hospitalization of COPD patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that since she is a nurse and needs this information for a graduate school assignment that she is entitled to the information. Is Sue correct in her thinking?


Download ppt "Chapter 12 by Lisa Reeves Bertin Securing Information in a Network."

Similar presentations


Ads by Google