Saturday, March 21, 2020

Information Security The Physical Security Factor

Today, more than ever before, healthcare organizations are increasingly becoming dependent on computer-based systems to access critical patient data and provide treatment solutions remotely via virtual private networks (VPNs).Advertising We will write a custom essay sample on Information Security: The Physical Security Factor specifically for you for only $16.05 $11/page Learn More Consequently, any kind of disruption targeting these information systems may occasion consequences ranging from inconvenience to catastrophe (Loch, Carr Warkentin, 2002). But while research in both academia and industry has developed effective technological and software-based solutions to protect information systems against possible threats and attacks (Stajano Wilson, 2011), only a handful of the articles found in various databases pay close attention to the physical aspect of information security (Huigang Yajiong, 2010). This paper is devoted to outlining some of the fund amental steps that need to be considered for the physical security of computers used in an urgent care center to access patient data and their email system via a VPN. Stajano Wilson (2011) note that effective countermeasures against security threats to information systems depend on first strengthening the human element to make users understand how they can naturally fall victim to fraudsters. This therefore implies that users, in this case physicians and other health practitioners, need to be exposed to some form of training on how they can use the system without compromising the security aspect of the network. For instance, system users could be exposed to formal training on how to discard used electronic media containing sensitive patient information through available techniques instead of leaving the information on the computer drives.Advertising Looking for essay on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Purging is one such technique that could be used by the practitioners to completely erase sensitive files which may have been deleted from the computer drives but not overwritten with other data (Walters, 2007). From a holistic security engineering standpoint, computers are often vulnerable to instances of theft and other possible attacks if the immediate physical environment is not secured (Stajano Wilson, 2011). This therefore implies that doors leading to the computer rooms must not only be secure, but must be kept under lock and key and windows adequately grilled to curtail any occurrence of unauthorized access to the computer rooms (Walters, 2007). Indeed, many organizations have a policy that restricts entry to the computer and server rooms to authorized personnel, in most occasions a systems analyst or administrator. It should be noted that this aspect of physical security is fundamentally important since all the other factors are dependent on how safe the computer or server room is from possib le attacks and illegal access. Engaging trained security personnel and dogs to physically protect the information systems is yet another physical aspect of information security that is intrinsically important yet seldom considered by many organizations (Loch et al, 2002). Patient data is sensitive in nature, thus the need to engage all efforts that may be deemed necessary to protect the computers from theft or illegal access. Consequently, trained security personnel forms a critical aspect of the physical security of information security needed to secure the computer rooms and the immediate environment from possible attacks, which may result in the theft of computers and by extension the loss of critical data (Perrig, Stankovic Wagner, 2004). Dogs are always useful in repelling thieves from accessing the urgent care center.Advertising We will write a custom essay sample on Information Security: The Physical Security Factor specifically for you for only $16.05 $11/pag e Learn More Access to computer areas and server rooms should be restricted through the use of identification badges or authorization cards to ensure that only the authorized health practitioners gain access to these critical areas (Perrig et al, 2004). For instance, the organization may invest in electronic identification badges that must first be accepted by the system or the door lock for them to gain access to the information stored in the computers. Research has demonstrated that identification cards and access control points inarguably decrease the possibility of attackers to physically tamper with information stored in computer systems or to even have access to areas where such computers may be located (Loch et al, 2002). Physical security of information systems cannot be complete without engaging the authentication processes via personal identification numbers (PIN), passwords, computer locks, and other devices that may be used to limit access to authorized us ers only. According to Renaud De Angeli (2009), â€Å"†¦authentication is required to verify that the user’s proffered identity is valid† (p. 135). It is only plausible for physicians and other health practitioners using the VPN to access sensitive patient data to memorize their PINs and/or passwords rather than writing them down on a piece of paper because such information could be accessed by other employees or external individuals harboring ulterior motives. Computer locks could always be employed to prevent other employees or strangers from gaining access to the data stored in the computer or from manipulating computer hardware configurations with the aim to steal data or remotely control the computer system (Stajano Wilson, 2007). Lastly, the environmental factors need to be effectively controlled to make the physical security of information systems a reality.Advertising Looking for essay on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Instances of fire outbreak, flooding of computer areas and server rooms, extremely high temperatures, electricity variations and other environmental concerns need to be effectively managed to prevent loss of use and loss of productivity of the information systems (Perrig et al, 2004). For instance, flooding of the server room may occasion protracted dysfunctions of the server system, leading to loss of connectivity and subsequent loss of access to critical patient data even among the authorized users. Going by this example, therefore, the urgent care center should invest in an effective drainage system to prevent instances of flooding. Reference List Huigang, L., Yajiong, X. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394-413. Retrieved from Business Source Premier Database. Loch, K.D., Carr, H.H., Warkentin, M.E. (2002). Threats to information systems: Today’ s reality, yesterday’s understanding. MIS Quarterly, 16(2), 173-186. Retrieved from Business Source Premier Database. Perrig, A., Stankovic, J., Wagner, D. (2004). Security in wireless sensor networks. Communication of the ACM, 47(6), 53-57. Retrieved from Business Source Premier Database. Renaud, K., De Angeli, A. (2009). Visual passwords: Cure-all or snake-oil? Communications of the ACM, 52(12), 135-140. Retrieved from Business Source Premier Database. Stajano, F., Wilson, P. (2011). Understanding scam victims: Seven principles for systems security. Communications of the ACM, 54(3), 70-75. Retrieved from Business Source Premier Database. Walters, L.M. (2007). A draft of an information systems security and control course. Journal of Information Systems, 21(1), 123-148. Retrieved from MasterFILE Premier Database. This essay on Information Security: The Physical Security Factor was written and submitted by user Jameson Bell to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Thursday, March 5, 2020

Commonly Confused Words for ESL Students and Classes

Commonly Confused Words for ESL Students and Classes Here are some of the most commonly confused English word pairs. They have been chosen especially for ESL learners. beside / besides beside: preposition meaning next to, at the side of Examples: I sit beside John in class.Could you get me that book? Its beside the lamp. besides: adverb meaning also, as well; preposition meaning in addition to Examples: (adverb) Hes responsible for sales, and a lot more besides.(preposition) Besides tennis, I play soccer and basketball. clothes / cloths clothes: something you wear - jeans, shirts, blouses, etc. Examples: Just a moment, let me change my clothes.Tommy, get your clothes on! cloths: pieces of material used for cleaning or other purposes. Examples: There are some cloths in the closet. Use those to clean the kitchen.I have a few pieces of cloth that I use. dead / died dead: adjective meaning not alive Examples: Unfortunately, our dog has been dead for a few months.Dont touch that bird. Its dead. died: past tense and past participle of the verb to die Examples: His grandfather died two years ago.A number of people have died in the accident. experience / experiment experience: noun meaning something that a person lives through, i.e. something that someone experiences. - also used as an uncountable noun meaning knowledge gained by doing something Examples: (first meaning)His experiences in Germany were rather depressing.(second meaning) Im afraid I dont have much sales experience. experiment: noun meaning something that you do to see the result. Often used when speaking about scientists and their studies. Examples: They did a number of experiments last week.Dont worry its just an experiment. Im not going to keep my beard. felt / fell felt: past tense and past participle of the verb to feel Examples: I felt better after I had a good dinner.He hasnt felt this well for a long time. fell: past tense of the verb to fall Examples: He fell from a tree and broke his leg.Unfortunately, I fell down and hurt myself. female / feminine female: the sex of a woman or animal Examples: The female of the species is very aggressive.The question female or male means are you a woman or a man. feminine: adjective describing a quality or type of behavior that is considered typical for a woman Examples: Hes an excellent boss with a feminine intuition.The house was decorated in a very feminine manner. its / its its: possessive determiner similar to my or your Examples: Its color is red.The dog didnt eat all of its food. its: Short form of it is or it has Examples: (it is) Its difficult to understand him.(it has) Its been a long time since I had a beer. last / latest last: adjective usually meaning final Examples: I took the last train to Memphis.This is the last test of the semester! latest:  adjective  meaning most recent or new Examples: His latest book is excellent.Have you seen his latest painting? lay / lie lay: verb meaning to put down flat - past tense - laid, past participle - laid Examples: He laid his pencil down and listened to the teacher.I usually lay my pies on the shelf to cool. lie: verb meaning to be down - past tense -lay (be careful!), past participle - lain Examples: The girl lay on the bed asleep.At the moment, hes lying on the bed. lose / loose lose: verb meaning to misplace Examples: I lost my watch!Have you ever lost anything valuable? loose: adjective meaning the opposite of tight Examples: Your trousers are very loose!I need to tighten this screw. Its loose. male / masculine male: the sex of a man or animal Examples: The male of the species is very lazy.The question female or male means are you a woman or a man. masculine:  adjective  describing a quality or type of  behavior  that is considered typical for a man Examples: Shes a very masculine woman.His opinions are just too masculine for me. price / prize price: noun - what you pay for something. Examples: The price was very cheap.Whats the price of this book? prize: noun - an award Examples: He won a prize as best actor.Have you ever won a prize in a competition? principal / principle principal: adjective meaning the most important Examples: The principal reason for my decision was the money.What are the principal  irregular verbs? principle: a rule (usually in science but also concerning morals) Examples: Its the first principle of aerodynamics.He has very loose principles. quite / quiet quite:  adverb  of degree meaning very or rather Examples: This test is quite difficult.He was quite exhausted after the long journey. quiet:  adjective  meaning the opposite of loud or noisy Examples: Could you please be quiet?!Shes a very quiet girl. sensible / sensitive sensible: adjective meaning having common sense i.e. not stupid Examples: I wish you would be more sensible about things.Im afraid you arent being very sensible. sensitive: adjective meaning to feel very deeply or to hurt easily Examples: You should be careful with David. Hes very sensitive.Mary is a very sensitive woman. shade / shadow shade: protection from the sun, a dark area outside on a sunny day. Examples: You should sit in the shade for a while.Its too hot. Im going to find some shade. shadow: the dark area created by something else on a sunny day. Examples: That tree casts a large shadow.Have you  every  noticed your shadow getting longer as it gets later in the day? some time / sometimes some time: refers to an indefinite time in the future Examples: Lets meet for coffee some time.I dont know when Ill do it - but I will do it some time. sometimes:  adverb of frequency  meaning occasionally Examples: He sometimes works late.Sometimes, I like eating Chinese food.