“Securing Health Care Information Systems” Please respond to the following:
- From the e-Activity, give your opinion as to whether or not the new procedures that the hospital implemented efficiently resolve the issues in this case. Next, suggest an additional procedure that the hospital could utilize in order to secure patient privacy regarding medical condition and treatment plan. Justify your response.
- Identify the key threats (e.g., internal, external, intentional, and unintentional, etc.) to the security of health care information. Select the single most significant threat, and suggest one (1) way to minimize the threat that you have chosen. Provide a rationale to support your suggestion.
Grammarly GrammarlyReport generated on Wednesday, Feb 7, 2018, 12:04 PM Page 1 of
4
3
1
1
3
11
DOCUMENT
order_40442_SecuringHealthCareInformationSystems
SCORE
78
ISSUES FOUND IN THIS TEXT
19
PLAGIARISM
67%
Contextual Spelling 4
Misspelled Words
Confused Words
Grammar
Punctuation
Sentence Structure 1
Misplaced Words or Phrases
Style 3
Passive Voice Misuse
Vocabulary enhancement 11
Word Choice
of 100
No errors
No errors
Grammarly GrammarlyReport generated on Wednesday, Feb 7, 2018, 12:04 PM Page 2 of 4
order_40442_SecuringHealthCareInformationSystems
HEALTH CARE SEURITY THREATS
4
RUNNING HEAD: HEALTH CARE SEURITY
THREATS 1
HEALTH CARE SEURITY
THREATS
NAME:
INSTITUTION:
QUIZ A
In my opinion, a couple of methodologies that the doctor’s
facility actualized did not efficiently solve the issues for the
situation. It is because of the way that data frameworks
programmers have created modern frameworks of
obtaining entrance of the data frameworks of firms
incorporating those with sound frameworks of inside
controls. Any endeavor to actualize the computerized data
framework inside the health care framework ought to be
1
2
3
5
6
1
[SEURITY SECURITY]→
2
[SEURITY SECURITY]→
3
[SEURITY SECURITY]→
4
Unoriginal text: 88 words
www.coursehero.com/file/18579307/…
Grammarly GrammarlyReport generated on Wednesday, Feb 7, 2018, 12:04 PM Page 3 of 4
finished with a large amount of care because of the
delicate way of the data held in medicinal services.
To guarantee that the security of the patient data is
ensured , I recommend that the hospitals execute
encryption measures and the public key frameworks
when sharing such data. Encryption of patient wellbeing
data guarantees that data is sent in the unreadable
format which must be decrypted by an approved individual
on the less than a desirable end. Public key framework
additionally guarantees that an approved individual at
whatever point it is going through the system must open
data.
QUIZ B
The top primary security dangers to medicinal services
data incorporate virtualization of programming, inserted
devices, the increment of online networking and mobile
utilization. Among these dangers , implanted gadgets with
Wi-Fi abilities, for example, the patient monitoring
frameworks and pharmaceutical scanners represent the best
risk to medicinal services data. It is because of the way
that the implanted gadgets put a great deal of strain on the
framework transfer speed along these lines making the
framework helpless against infections and different
assaults postured by a couple of associated gadgets that are
fundamentally not the same as the conventional PCs. To
succeed this difficulty , a security arrangement ought to
be fused; for example, firewalls to protect the privacy of
data passed using the organizational intranets.
7 8
9 4
11 10
12
13 14
15
16
18
19
20
21
22
5
Unusual word pair
6
Possibly miswritten word: health care
7
Passive voice
8
Overused word: large
9
Unusual word pair
10
Unoriginal text: 14 words
www.coursehero.com/file/24444690/…
11
Passive voice
12
Overused word: key
13
Repetitive word: data
14
Passive voice
15
Overused word: key
16
Repetitive word: approved
17
Unoriginal text: 139 words
www.coursehero.com/file/p5hvibq/To-…
18
Unusual word pair
19
Repetitive word: dangers
20
Unusual word pair
21
Unusual word pair
22
Dangling modifier
Grammarly GrammarlyReport generated on Wednesday, Feb 7, 2018, 12:04 PM Page 4 of 4
Reference
All Case Examples | HHS.gov. (n.d.). Retrieved from
http://www.hhs.gov/hipaa /for-professionals/compliance-
enforcement/examples/all-cases/index.html?language=en
17