Preview

Statistics Lab week 6

Powerful Essays
Open Document
Open Document
3844 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Statistics Lab week 6
Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding:
1. Security Components
2. Security Principles
3. Threats, Vulnerabilities, Control Measures and Information Assurance
4. Achieving Information Security: Administrative, Physical, Technical
Safeguards
Security is achieved by addressing its components: confidentiality, integrity, availability and accountability.
1. Confidentiality is the property that data or information is not made available or disclosed to unauthorized persons or processes.
2. Integrity is the property that data or information have not been altered or destroyed in an unauthorized manner.
3. Availability is the property that data or information is accessible and useable upon demand by an authorized person.
4. Accountability is the ability to audit the actions of all parties and processes which interact with the information and to determine if the actions are appropriate.

Numerous threats exist to computer systems and the information they contain originating from within and outside organizations. Some common threats include malicious code such as viruses, Trojan horses, or worms.
Malicious code often takes advantage of vulnerabilities in operating system software but depends, too, upon organizational weaknesses such as the failure to deploy, update or train workers in the use of antivirus software.
Malicious code may enable denial of service attacks, impersonation, information theft and other intrusions. Attacks by famous malicious code such as the Melissa or Lovebug viruses highlight the threat of “hackers”, outsiders with intent to harm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1. When rolling a die, is this an example of a discrete or continuous random variable? Explain your reasoning.…

    • 619 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Statistics 3022

    • 1804 Words
    • 8 Pages

    1. Following the explosion of the 25th space shuttle flight, which was caused by an O-ring failure in one or more of the booster rockets, data from the previous 24 flights were studied. The Temperature (F) at the time of launch and whether or not there was evidence of O-ring failures for each of the previous 24 shuttle flights was determined for each flight. A logistic regression relating the Failure of O-rings to the Temperature was obtained with the following result:…

    • 1804 Words
    • 8 Pages
    Good Essays
  • Better Essays

    A population is the total of all the individuals or objects that could be observed or measured. A sample is a subset or portion of a population. Sample should represent the population with fewer but sufficient number of items. One Population can have several…

    • 1640 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Stat Project

    • 1710 Words
    • 7 Pages

    From graph c, there is another weak positive liner relationship between COMP scores and GPA; the correlation is 0.342; the equation of regression is GPA=0.0524047*COMP+1.8243; the slope is 0.0524047 which is positive; when the predictor variable COMP increase, the response variable GPA also weakly increase; for example, COMP scores increase by 1, the GPA will increase 0.0524047. Based on the graphs and data which I got, I think there are only a little relation among HSP, COMP scores and GPA. I can find out a student with…

    • 1710 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Statistics Chap12, Cases

    • 2342 Words
    • 10 Pages

    From the descriptive statistics we see that six of the companies had a higher mean monthly return than the market (as measured by the S&P 500): Exxon Mobil, Caterpillar, McDonald’s, Sandisk, Qualcomm, and Procter & Gamble. Microsoft and Johnson & Johnson had lower mean monthly returns.…

    • 2342 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    My description of Descriptive statistics is that they are the numerical elements that make up a data that can refer to an amount of a categorized description of an item such as the percentage that asks the question, “How many or how much does it take to “ and the outcome…

    • 729 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    References: Merkow, Mark & Breithaupt, Jim. (2006). Information Security: Principles and Practices. Published by Prentice Hall. Retrieved August 19, 2011…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    In a third world country, 100 randomly selected people were surveyed about their socioeconomic class and religious affiliation. The results and an excerpt from the results section of this fictional study follow.…

    • 6951 Words
    • 28 Pages
    Satisfactory Essays
  • Good Essays

    statistics GCU

    • 2646 Words
    • 11 Pages

    Explain the importance of random sampling. What problems/limitations could prevent a truly random sampling and how can they be prevented?…

    • 2646 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Stats Week 5 Problem Sets

    • 389 Words
    • 2 Pages

    2) Determine the coefficient of correlation and the coefficient of determination. Interpret the association between X and Y.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    AP stats project

    • 855 Words
    • 4 Pages

    Our topic is about harmful effects that can affect a student’s performance in school and daily life. Our population of interest would be college students as they are the demographic most subject to many negative influences. Our sample would be stratified because we want to compare the answers of each of the classes: freshman, sophomores, juniors, and seniors. As a result, we would be able to see what types of harmful effects each class of students are most concerned about.…

    • 855 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Statistics Module 1

    • 824 Words
    • 4 Pages

    How could graphics and/or statistics be used to misrepresent data? Where have you seen this done?…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biostatistics Exam 1 2012

    • 441 Words
    • 9 Pages

    it reasonable to conclude that heart or respiratory disease were the cause of approximately 33% of…

    • 441 Words
    • 9 Pages
    Good Essays