12 Questions
Hardware security features include hardware identification, isolation features, access control, surveillance, and ______.
integrity
Specific protection could include physical barriers such as special doors, locks on individual machines, and control over the use of communication links to the ______.
system
Software security requires the operating system to provide the same features as the hardware security system. It must be able to identify and authenticate to isolate, to control access, and to have surveillance and ______.
integrity
Authentication refers to the methods by which a system verifies the identity of a user, usually based on passwords or physical ______.
tokens
Security mechanisms designed to protect patient confidentiality generally rely on some combination of authentication, authorization, and ______.
auditing
Authorization denotes access controls or other means used to provide specific information to a given ______.
user
Data Security Breaches can result in public embarrassment or loss of public confidence, question of personal safety, infringement of personal privacy, and failure to meet ______ obligations
legal
Damage to patients is of vital concern; however, other types of damage like legal cases, financial loss, and loss of public confidence can cause great damage to organizations. To address these concerns, nurses should be involved in formulating specific, documented policies related to data ______
security
When data protection policies are in place, nurses are not left in the dangerous situation of having to make judgments about use of data without any regulations to assist them. The three areas identified here must be considered when defining data protection ______
policies
Data protection policies will contribute to an overall organizational disaster plan, as discussed in Chapter 17. Protecting Data Usage Integrity involves three approaches: hardware, software, and ______
organizational
Hardware security is concerned with the protective features that are part of the architectural characteristics of the data-processing ______
equipment
To protect data usage integrity, it is suggested to consider three approaches: hardware, software, and ______
organizational
Explore the various outcomes that can result from breaches in data security, including public embarrassment, loss of public confidence, and financial loss. Understand the implications on personal safety, privacy, legal obligations, and commercial confidentiality.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free