Chapter 8 ayk

'''  '''

1a. Physical & Logical threats to the hospitals medical records hard drives could get stolen get destroyed or someone gains access to the computer. Someone uses Username and Passwords to get in by hacking.



1b. Threats might exist from individuals who are looking for medical records about someone. Medical records are sensitive and need extensive protection.



1c. To protect from this hospitals could lock up the hard drives so they cant be stolen. Have biometric security or swipe cards or username and passwords. Only give access to doctors, nurses and specialists.



2. To prevent email viruses infecting companies computers, train staff not to open attachments that look unfamiliar. Install anti-virus software. Use filters such as a SPAM filter.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">3a. Back up strategies could include saving it to an off site location as a back up in case their system goes down.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">3b. Have the backup files saved to another server that is off site to evaluate how effective the backup is. Run a disaster simulation and see if the backups work.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">4a. The game that has been hidden is not a work related task and are using the network recourses to play games.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">4b. There is no policy against playing the games.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">5. An organisation might object to employees using internet for private purposes because it is not work related and is a distraction.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">6. Sending a hoax virus is unethical but if they are using it for the system than it is illegal.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">7a. The advantages of a cloud solution to the club is that they don’t need to buy any software for their computers and everything is saved online.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">7b. Disadvantages are that if there is no internet access they can not access their data. It can also be slow.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">7c. It is a centralised database so everyone can access it and share the information. You can add as many users as you want to share the files with.

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">

<p style="text-align:center"><span style="font-family:"Calibri","sans-serif";mso-ascii-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin">7d. The only storage solution necessary with a cloud solution would be regular backups on CD’s, USB’s, etc.