Tuesday, January 28, 2020

Information Security Classification Essay Example for Free

Information Security Classification Essay Information Security is simply the process of keeping information secure: protecting its availability, integrity, and privacy (Demopoulos). With the advent of computers, information has increasingly become computer stored. Marketing, sales, finance, production, materials, etc are various types of assets which are computer stored information. A large hospital is an institution which provides health care to patients. They are staffed by doctors, nurses, and attendants. Like any large organization, a hospital also has huge amounts of data and information to store. Hospitals have increasingly become automated with computerized systems designed to meet its information needs. According to the Washtenaw Community College website, the following types of information are stored in a Hospital: †¢ Patient information †¢ Clinical laboratory, radiology, and patient monitoring †¢ Patient census and billing †¢ Staffing and scheduling †¢ Outcomes assessment and quality control †¢ Pharmacy ordering, prescription handling, and pharmacopoeia information †¢ Decision support †¢ Finance and accounting †¢ Supplies, inventory, maintenance, and orders management Viruses, worms and malware are the most common threats to information security. In computers, a virus is a program or programming code that replicates by being copied or initiating it’s copying to another program, computer boot sector or document (Harris, 2006). Floppy disks, USB drives, Internet, email are the most common ways a virus spreads from one computer to another. Computer viruses have the potential to damage data, delete files or crash the hard disk. Many viruses contain bugs which can cause system and operating system crashes. Computer worms are malicious software applications designed to spread via computer networks (Mitchell). They also represent a serious threat to information security. Email attachments or files opened from emails that have executable files attached are the way worms spread. A Trojan is a network software application designed to remain hidden on an installed computer. Software designed to monitor a persons computer activity surreptitiously and which transmits that information over the internet is known as spy ware (Healan, 2005). Spy ware monitors information using the machine on which it is installed. The information is transmitted to the company for advertising purposes or sold to third party clients. Identity theft and data breaches are two of the biggest problems facing Information security managers. Hackers steal Social Security numbers, credit card data, bank account numbers and other data to fund their operations. There are other potential threats to the hospital information like power outages, incompetent employees, equipment failure, saboteurs, natural disasters, etc. A large hospital requires an information classification policy to ensure that information is used in appropriate and proper manner. The use of the information should be consistent with the hospital’s policies, guidelines and procedures. It should be in harmony with any state or federal laws. The hospital’s information should be classified as follows: 1. Restricted 2. Confidential 3. Public Restricted information is that which can adversely affect the hospital, doctors, nurses, staff members and patients. Its use is restricted to the employees of the hospital only. Finance and accounting, supplies, inventory, maintenance, and orders management are restricted information which comes in this category. Confidential information includes data on patients which must be protected at a high level. Patient information, clinical laboratory, radiology, and patient monitoring are some of the information which comes in this category. It can also include information whose disclosure can cause embarrassment or loss of reputation (Taylor, 2004). Public information includes data which provides general information about the hospital, its services, facilities and expertise to the public. Security at this level is minimal. This type of information requires no special protection or rules for use and may be freely disseminated without potential harm (University of Newcastle, 2007). Information Classification Threat Justification Patient information Confidential Disclosure or removal Any disclosure or removal can cause serious consequences to the patient Clinical laboratory, radiology, and patient monitoring Confidential Disclosure or removal Any disclosure or removal can cause serious consequences to the patient Finance and accounting, supplies, inventory, maintenance, and orders management Restricted Loss or destruction Any loss or destruction of this information could be very dangerous for the organization General information about the hospital, its services, facilities and expertise Public Low threat Low threat since the information is public. It would affect public relations however. Research Information Confidential Disclosure or removal This is confidential material since its exposure would cause serious consequences for the hospital Figure: Classification table Information is an asset for the hospital. The above information classification policy defines acceptable use of information. They are based according to the sensitivity of the information. According to the government of Alberta information security guideline, there are four criteria are the basis for deciding the security and access requirements for information assets. These criteria are: Integrity: information is current, complete and only authorized and accurate changes are made to information; Availability: authorized users have access to and can use the information when required; Confidentiality: information is only accessed by authorized individuals, entities or processes; and Value: intellectual property is protected, as needed. Information security must adequately offer protection through out the life span of the information. Depending on the security classification, information assets will need different types of storage procedures to ensure that the confidentiality, integrity, accessibility, and value of the information are protected. The hospital director must be responsible for the classification, reclassification and declassification of the hospital’s information. The information security policy must be updated on a regular basis and published as appropriate. Appropriate training must be provided to data owners, data custodians, network and system administrators, and users. The information security policy must also include a virus prevention policy, intrusion detection policy and access control policy. A virus prevention policy would include the installation of a licensed anti virus software on workstations and servers. The headers of emails would also be scanned by the anti virus software to prevent the spread of malicious programs like viruses. Intrusion detection systems must be installed on workstations and servers with critical, restricted and confidential data. There must be a weekly review of logs to monitor the number of login attempts made by users. Server, firewall, and critical system logs should be reviewed frequently. Where possible, automated review should be enabled and alerts should be transmitted to the administrator when a serious security intrusion is detected. Access to the network and servers and systems should be achieved by individual and unique logins, and should require authentication. Authentication includes the use of passwords, smart cards, biometrics, or other recognized forms of authentication. This policy is the access control policy. It prevents unauthorized access to critical data. A large hospital like any organization today uses computers to store its information. The classification of its data is a very important goal to protect it from threats like viruses, Trojans, worms, spy ware, ad ware and hackers. Natural disasters and incompetent employees are another type of threats to the hospital’s data. A proper information security policy can protect the organization’s critical data from any external or internal threat. Bibliography Allen, Julia H. (2001). The CERT Guide to System and Network Security Practices. Boston, MA: Addison-Wesley. 0-201-73723-X. Krutz, Ronald L. ; Russell Dean Vines (2003). The CISSP Prep Guide, Gold Edition, Indianapolis, IN: Wiley. 0-471-26802-X. Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications. 978-0-8493-7087-8. McNab, Chris (2004). Network Security Assessment. Sebastopol, CA: OReilly. 0-596-00611-X. Peltier, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Auerbach publications. 0-8493-0880-1.

Monday, January 20, 2020

Stonehenge :: history

Stonehenge Stonehenge is not only the most famous stone circle in Britain, but also the best-known ancient monument in the World, with at least  ½ a million visitors each year. Located on Salisbury Plain, north of Salisbury, England, it is famous for the debate, mystery, and speculation surrounding it. Stonehenge was not built all in one single step, but rather in four separate stages, dating from approximately 3100BC to 1500BC. The modern visitor to Stonehenge is viewing the ruins of the final phase of construction site. The monument itself consists of four concentric ranges of stones. The oldest part, called Stonehenge I, consists of little more than a circular ditch dug in the chalky soil of the Salisbury Plain, with the soil taken from the ditch piled up to make an enbankment about 6 ft tall. This part of the monument is about 320 ft across. Inside this large circle are the things that we normally think of as Stonhenge proper; circles of stones that once stood upright, and the most photog enic, the large horseshoe arrangements of standing stones at the center. These last, the so-called trillithons, consist of upright stones supporting horizontal lintels, and the largest of them weigh in around 45 tons. These massive stones have been placed in unison with these circles to create Stonehenge and along with that bring about the curiosity of why one would build such a structure as that of Stonehenge. The location of Stonehenge was not simply a coincidental happening, for the latitude is very specific in its function. In the Northern Hemisphere there is only one latitude for which, at their extreme declinations, the sun and moon azimuths are separated by 90 º, and Stonehenge happens to be only a few miles from that latitude. At the latitude of Stonehenge, this axis crosses the midwinter sunset/midsummer sunrise axis at right angles. Every year on the first day of summer, the Sun rises at a point that is farther north than on any other day of the year. At the ruins of Stonehenge in England, this solstice sunrise appears on the horizon in direct alignment with the massive heel stone. This is the most outstanding feature of this ancient monument, built during the same era as the Great Pyramid of Egypt. There is little doubt that the builders of Stonehenge used it to mark this special day as the beginning of each year.

Sunday, January 12, 2020

Premature Rupture of Membranes Essay

When the fluid is lost the cord and fetus can be compressed causing decelerations in which the baby must be removed from the womb. For example, last week in clinical there was a 33 gestational week mother with PPROM who was a smoker and tested positive for opioids. The fetal monitor the night before had indicated decelerations throughout the night, one even lasting nearly 8 minutes. The nurse I was assigned to said that â€Å"she did not realize how close to delivery she was. If a deceleration cannot be brought up in 10 minutes, they are on their way to the OR to deliver! . As discussed in the article, infection is also a major problem with PPROM. The amniotic fluid creates a seal of sorts that is to protect the mother and infant from infection and other harmful things that could enter into the environment of the growing fetus. Once this is lost, infection is easily contracted. Usually infections associated with PPROM are bacterial. According to the article, these types of infection s cause a string of effects that virtually throw the mother into premature labor. Because of the infection, prostaglandins are released. These then cause uterine contractions. However, the metalloproteases that are also released cause the cervix to soften and relax. This is the cause of the membrane rupture according to the article. Race is also thought to play a role in the risk of PPROM. It says that â€Å"black and Hispanic women are at a higher risk in comparison to white women [for PPROM]†. Diagnostic procedures can also cause PPROM. These include carclage and amniocenteses. Because these procedures compromise the integrity of the amniotic sac; the risk for PPROM is increased greatly along with the risk for infection. Management of the PPROM patient depends on gestational age and severity of luid loss. It could be treatment such as medications or it could go as far as full bed rest until delivery. According to the article, 34 weeks ot gestation witn no other complications will often lead to antibiotics and corticosteroids to prolong the pregnancy and decrease the risk for infections. However, in some of the extreme cases that were seen, bed rest or delivery of fetus was seen. In clinical, one of the patients seen was on bed rest until delivery and constant fetal monitoring. In conclusion, infection tends to be the most common effect of PPROM. Smoking nd drug use are viewed as the most common causing risk factors, and fetal complications can range from poor formation of lungs and other physical features, low birth weight, to even fetal death. It is important to educate newly pregnant mothers on risk factors of PPROM, the effects that could occur with PPROM, and educate them on what they can do to prevent this from happening during their pregnancy.

Saturday, January 4, 2020

Most Basic and Frequently Asked Interview Questions and...

Most Basic and Frequently Asked Interview Questions and Answers 1. Tell me something about yourself 2. Why should we hire you? Or how can u say that you are the right candidate? 3. Why BPO/ (company name)? 4. What are your strengths and weaknesses? 5. What are your short term and long term goals? 6. What are your contributions in order to meet the goals of our company? 7. Tell me about your native place. 8. Tell me about your college days. 9. Can u explain about Child labour/Corruption/Poverty? 10. Why do you want to leave your current job? 11. Describe the movie you have seen recently. 12. Tell me about a memorable/happiest/saddest day in your life. 13. Who is your role model, and why? 14. What is your favourite colour? Talk about it. 15.†¦show more content†¦Why Education Industry? Ans: Nowadays bpo is the most stable and fast growing industry despite the global economic crisis. Great career opportunities await qualified individuals who will join in this industry. Working in a call center will also help me to develop my skills to become globally competitive. and there is a scope of international exposure also, it will give total job satisfaction along with shape to my future. That is why I prefer to work in BPO. Education industry is an evergreen and recession free industry which is booming rapidly. It is believed that based on the current and future manpower requirements of the various sectors; there is a huge demand-supply gap in the education space. This has attracted me to enter in education and training institutions which are with the aim of building valuable franchises that can be rapidly scaled up. 4. What are your strengths and weaknesses? Ans: My Strength is â€Å"I am a Positive Thinker, Always motivated myself in difficulty situations†, My weakness is : As I said I am a positive thinker, I don’t think I have a weakness, But sometimes my frankness becomes my weakness, I am trying to overcome by working on it. Or I can say my weakness is sometimes I get involved with others problems unknowingly just for trying to help and to make them optimistic like me. But sometimes it gave sour result, then I pray god to excuse me. Or Strengths – Ability to prioritize, planning skills, well organized, multitaskingShow MoreRelatedAnalyzing The Successes And Barriers That Arose Upon Reflection Of My Initial Interviewing Experience Essay1249 Words   |  5 PagesIn social science research, research methods are an essential part of any project because they determine its validity, reliability and success. For qualitative researchers, interviewing is the most widely employed means for generating information (Holstein Gubrium, 2004). It is claimed by Cohen (et al., 2007) that interviewing is valuable because it not only reports detailed views of interviewees, but also enables participants to speak in their own voice and express their own feelings and experiencesRead MoreThe Importance Of A Great Deal Of Information Regarding Varies Levels Of Personal As Well As Intrapersonal Relations1264 Words   |  6 PagesIntroduction The basic emotion of happiness consumes the average day of an individual a countless number of times. From the simplest encounter with a loved one to the birth of a child we are continuously overwhelmed with this great sense of bliss. Although this emotion and the experiences which bring it about are expressed and shared by people the world over, a question must still be raised; what does it mean to happy? The present study aims to answer this question through the analysis of qualitativeRead MoreThe Role Of Organizational And Contextual Constraints On The Strategic Change Management And Planning Process1520 Words   |  7 PagesHowever, this research project is going to explore viable solutions to make an effective strategic change in the public sector organisations of Dubai. In this regard, the study is going to assess the research area through conducting a research based interview data collection method. Through this method, the research will try to explore the influence of organi sational and contextual constraints on the strategic change management and planning process and find out the major factors elements of the planningRead MoreThe Media s Role Into The Lives Of Our American Youth1405 Words   |  6 Pagesgives the kid a reason to want to go. Another advertising strategy McDonald’s does is, they offer toys to kids meals. Those technics greatly impact our youth. Kids will sit around and watch TV and eat McDonald’s. That results in kids gaining weight. Basic observations will find that to be true. â€Å"Children and adolescents are bombarded with food advertisements to the tune of 1.6 billion dollars a year and the habits portrayed in those advertisements are consistently unhealthy, emotionally based, and spanRead MoreOlder Adults Are More Vulnerable For Health Conditions And Impairments908 Words   |  4 Pagesnot seen John since I was an adolescent, he kindly allowed me to conduct a FaceTime interview of him. I personally have not met m any people over the age of sixty-five, but since I knew that older adults were more vulnerable to health conditions and impairments, I hoped that John was doing well. Fortunately, when I FaceTimed John and observed him, I noticed that he was alert and appeared physically healthy. I asked John to tell me a little bit about himself and what his typical day was like, and heRead MoreThes Outer Ring For A Total Of Two Times1426 Words   |  6 PagesAs stated previously, I walked around UCI’s outer ring for a total of two times. Thus, the setting of the interviews varied tremendously. If UCI’s ring was divided into four sections, the interviews covered all four. Sample-wise, eleven Anteaters were interviewed (composed of five females and six males). Year-wise (i.e. freshman, sophomore, junior, senior, or graduate), I interviewed three first years, four second years, two fourth years, and two graduate students (first year and second year). TheRead MoreThe 2015 Millennium Development Goals And Education1174 Words   |  5 Pagesin 1948, education is a universal human right that should be free and compulsory through at least the basic elementary levels (United Nations Declaration of Human Rights Document). For nomadic pastoralists, who move regularly in order to find adequate grazing land for their livestock and water sources for survival, the traditional formal school set-up is often not feasible, and they are frequently excluded from receiving the education they are entitled to according to the Universal Declaration. OtherRead MoreRecruiting, Selecting, Orienting, and Training Essay example1323 Words   |  6 Pages | | | | | | | | |Company’s Web site |Job interview by human resources |Explanation of the |Apprenticeship training | | | |department |organization’s levels of | Read MoreTHE ESSAY FOR EVALUATING RESOURCES ON THE WEB1268 Words   |  6 Pagesobviously that everyone wants to get a dream job. A good CV (Curriculum vitae) and a successful job interview are what you need to make that dream come true. But it seems that job interview is really the biggest challenge to most of applicants. Even if you have a perfect CV but you do not prepare well for your interview, you will lose your chance. So how can you have the best preparation for a job interview? Thanks to the development of the Internet, you can easily search this topic on the World WideRead MoreSources Of Marketing Research Data1191 Words   |  5 Pagesresearch project does not already exist as secondary data, we have to determine the best way of collecting it. There are three fundamental approaches to the collection of primary data - observation, experiment, and survey. It is the third approach that most people normally associate with market research. The first two, however, also have an important role to play in certain circumstances. Observation It is sometimes better to watch what people do rather than to ask them what they do. This has the advantage