preview

Nt1310 Unit 3

Decent Essays

Discuss security standards and methods, including the need for data storage integrity and data backup and recovery. In addition to complying with Health Insurance Portability and Accountability Act (HIPPA), SMC needs to be valiant in how the organization will protect information and manage network security. Information security is the protection of information against risk to its integrity, inadvertent disclosure, or availability (Hawkins, 2013a). The most common threats an organization's network will face are hackers, spyware, viruses, worms, Trojan horses, and malicious insider (Hawkins, 2013a). To protect SMC from hackers, they will use firewalls and intrusion-detection devices. Firewalls protect network systems by obstructing unauthorized entry while allowing approved communications (Hawkins, 2013a). Intrusion-detection systems monitor who the user is and what the user accesses. To promote HIPPA, SMC will track the last names of users who accessed patients with the same last name to reveal inappropriate use of client information. …show more content…

To reduce malicious code, SMC will restrict staff from certain networking sites (Hawkins, 2013a). Additionally, SMC will govern policies that discourage downloading files from the Internet and using personal computer information. Another serious threat is the malicious insider. This can be a disgruntled employee or a recently fired employee who still has access to the network system. Prompt removal of privileges is necessary to avoid issues created by terminated malicious insiders. Separation of privileges is a common security tool that helps decrease vulnerability. If one person can alter pay rate and hours worked, another person must review and approve a report before the changes take

Get Access