This website uses cookies to ensure you have the best experience. Learn more

Electronic Security Essay

1202 words - 5 pages

With the latest advances in today’s technology and the innovation that has risen from our low observable aircraft all the way down advanced composite structures that are raising the bar in air superiority (PR Newswire, 2009). In this era, there are individuals who have the capability to get into your computer’s files, deploy viruses, Trojans and worms that will destroy your computer and your life. These have a negative impact on the lives of millions of people across the globe. Identity theft, privacy violations and stealing copyright material and selling it for financial gain (Oregon Law Review, 2003). The information that I will go over explains why many acts were put into action due to ...view middle of the document...

At that time, we did not realize that what we were doing was against the law. Later, the program was shut down by the federal government due to the copyright infringement that was happening. There was another platform that was released called Kazaa. This was another program that many people downloaded which was considered a P2P (peer to peer) system (Daily Breeze, 2003). A large number of people would do the same thing by uploading content so that it could be “shared” with other users. The problem with Kazaa was that it was filled with many nasty viruses that would disable a computer and retrieve your personal information (Hachman, 2002). This act was only one of the many others that were put into law. In 2002, there was another act that was enacted which was Federal Information Security Management Act (FISMA), 2002.

Before the Federal Information Security Management Act (FISMA) was enacted, Estonia was one of the places that was technologically advanced more than others at the time with the ability to complete many tasks on the internet via Wi-Fi (White, 2010). There was an array of several cyber attacks that occurred in this country. There were many speculations that Russia had something to do with the cyber crimes but it was later found out that Russia was not the culprit. The people of Estonia had the ability to make bank transactions from their mobile devices. Little did they know, that all of their information would be compromised.

One of the biggest security threats were against government assets. A good example was in the mid 2000’s while I was in the Air Force, there was an individual who inserted an unapproved flash drive into a government computer and shut down many of the systems that contained sensitive information which could compromise our nation. Human error or lack of care for the well being of others can also effect everything around us. The world today depends heavily on computer systems and other digital platforms such as cloud technology that has emerged. There had to be something put into place to protect not only government assets but also private information of others across the globe.

The largest threat to national security in our nations history was when Pvt. Manning released several sensitive documents to Wiki Leaks (Hastings, D., & Brown, S. R. 2013). The hundreds of pages that he released to Julian Asange put many people at risk and relationships with other countries (Radin, 2013). In reaction to the outcry for something to be put into place the Federal...

Other Papers Like Electronic Security

Evolution of Electronic Health Essay

1212 words - 5 pages records also allow for added security, privacy and organization of the medical record. Electronic medical records are secure. Organizations can ensure security via the use of passwords to ensure privacy and security. The federal government also provides incentives to health care facilities that implement electronic medical records by offering those facilities financial incentives. Providers who choose not to enter into an electronic medical

Changing Paper Documentation to Electronic in Healthcare

1303 words - 6 pages formal process of writing policies and procedures addressing access, security, confidentiality, print control, and disclosure and spoliation mitigation should be developed. Maintenance of a complete record inventory of existing management paper, storage, hybrid and electronic documents must be enhanced for an efficient transition. Finally developing a policy for destruction and retention of health records regardless of whether they are electronic

Administative Ethics Paper

1126 words - 5 pages physicians and patients are using mobile devices an order to communicate with each other more and more. This of course raises distresses when it comes to the security of protected health information. This article discusses the issue on security by the use of electronic transfer of protected health information between health care providers and patients and also how those issues may cross HIPAA Security Rule. The Health Insurance Portability and

Electronic Medical Records

1242 words - 5 pages system has improved the communication between physician and patient. (GA-HITREC, 2011) The electronic health record still has to follow the guidelines of HIPAA. HIPAA is in place to keep all medical records safe and private. The HIPAA law covers electronic health records and there are security measures that are to be followed to keep these records safe. One method is to have encrypted files so when they are sent through to other offices they

Hipaa and Its Impact

543 words - 3 pages utilizing the electronic medical records there must be a firewall in place to prevent computer hacking. The security services enable people who work in computer services to provide more security for the organization, as well as the patients. HIPAA has changed the way healthcare has practiced for many decades. It has changed jobs, created jobs and the way we look at our security and private information. There are no more medical records

Electronic Signatures And Their Use In Electronic Conveyancing

1752 words - 8 pages Week:Technology, Media & Telecoms: Make your Mark, Stephen Mason. 16th June 2005.EMIS Professional Pub Ltd:Intellectual Property & IT Law, ePen and Electronic Signatures Dr G Zekos, 31st Dec, 2003New Law Journal:The e-conveyancing jigsaw, Bill Mackie, 10th Feb 2006The Scotsman:Sign up to the New Form of Security, Lorna Mccall. 11th April 2002The Times:Bricks & Mortar 2, Catherine Riley, 11th March Signatures

Cyber Law of Bd

708 words - 3 pages first step of entering into the e-commerce. Not only these weaknesses of the Act but also others problems can to be brought through the Act. Advantages of Cyber law This Act has some disadvantages and also some advantages. This Act has provided us few advantages like as under the ICT Act, 2006, conduct important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the

Manual vs. Electronic Scheduling Processes

520 words - 3 pages because it will still exist in hard drives but manual documents can be easily thrown away. Manual documents can have patient’s information safe and locked away, but on the web where it could be exposed because of some sort of glitch that could expose patients’ information. “February 2003, final mandatory rules were released regarding what must be done to safeguard electronic information from unauthorized disclosure” (Moss pg.46, 2. Security Rule


2589 words - 11 pages some limitations of using Electronic commerce in a middle-size organization and these are classified as technological or non-technological. Technical limitations of electronic commerce include: • A lack of universal standards for quality, security, reliability and some communication protocols. • Telecommunications bandwidth not being sufficient, especially for m-commerce (electronic commerce via mobile phones). • Software development tools

HIPAA Security: Implementing Technical Safeguards

2233 words - 9 pages €¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦. 10 ABSTRACT The Security Role plays a vital role in protecting and securing electronic protected health information (ePHI). All covered entities and business associates that deal with ePHI are mandated to ensure that they remain in compliance with the Security Rule. Failure to do so can result in severe penalties and be detrimental for those covered entities and

Security Breach

1832 words - 8 pages to secure the data of firm and customers, yet, some security breaches are also faced by the firms due to technical advancement. For this paper, Sony Corp. is selected that has faced security breach. Sony Corporation is a multinational firm that operates its business in global market and belongs to Japan and produces electronic products for the customers (Sony Corp. Info, 2011). There will be discussion about products information, contact

Related Essays

Electronic Business Security Essay

617 words - 3 pages Karin Bean18, 2004E-Business Security CompanyAs an E-Business Security Company, RSA Security, which has its headquarters in Bedford, Massachusetts, provides inter-operational solutions for companies to enable secure online network connections and flawless integration with complex platforms. RSA is currently serving 13,000 customers around the globe and its strong reputation is built on its history of inventiveness and leadership as well as

Course Discription Essay

968 words - 4 pages Stallings, W., & Brown, L. (2008). Computer security principles and practice. Pearson Education, Inc. Software Microsoft® Project 2010 (Virtual Desktop) Microsoft® Visio® 2010 (Virtual Desktop) Microsoft® Excel® 2010 (Virtual Desktop) Microsoft® Word 2010 (Virtual Desktop) All electronic materials are available on the student website. Supplemental Resource Microsoft. (2012). Microsoft Office Project 2010. Hoboken, NJ

Healthcare Essay

565 words - 3 pages Electronic Health Records Sue Fletcher Electronic Health Records As the Media will portray America is on the forefront of a healthcare whirl wind with the new legislations coming into healthcare in the month and years ahead. Electronic Health Records (EHR) is one of the many things coming into healthcare in the coming months and years. Obama’s pledge to ensure all American health records would be electronic by 2014 and the allocation of

Mis Unit Vii Q7 Essay

619 words - 3 pages Electronic records management (ERM) is the systematic method to managing electronic records for efficient storage and retrieval during their useful life cycle. This includes the creation and implementation of set time frames for the retention and destruction of the record (Brown, DeHayes, Hoffer, Martin, & Perkins, 2012). ERM has become an important part of organizations’ information security for several reasons. First, the Sarbanes-Oxley Act