This topic contains a solution. Click here to go to the answer

Author Question: Which of the following is the protection of information against threats to its integrity, ... (Read 46 times)

Wadzanai

  • Hero Member
  • *****
  • Posts: 528
Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or availability?
 
  1. Information security
  2. Survivability
  3. Confidentiality
  4. Privacy

Question 2

Which of the following measures are recommended for enhancing information security? Select all that apply.
 
  1. File deletion software is used to overwrite hard disk files, using meaningless information.
  2. Storage media that has been erased is disposed of in the dumpster.
  3. Individuals routinely witness and record the destruction of records.
  4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the dumpster.
  5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

FergA

  • Sr. Member
  • ****
  • Posts: 352
Answer to Question 1

1
Rationale: Information security is the protection of information against threats to its integrity, inadvertent disclosure, or availability.

Answer to Question 2

1,3,5
Rationale: All papers containing personal health information (PHI) such as prescriptions, laboratory specimen labels, identification bracelets, meal descriptions, addressograph plates or any other items that carry a client's name, address, Social Security number, date of birth, or age must be destroyed. For tracking purposes, each page of output should have a serial number or other means of identification so that an audit trail is maintained that identifies what each paper record is as well as the date and method for destruction and the identity of individuals witnessing the destruction. Storage media should be destroyed or files electronically written over to ensure that no information can be retrieved from them. File deletion software overwrites files with meaningless information so that sensitive information cannot be accessed. Unauthorized or dormant e-mail accounts should be destroyed.




Wadzanai

  • Member
  • Posts: 528
Reply 2 on: Jul 7, 2018
Gracias!


brbarasa

  • Member
  • Posts: 308
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

The highest suicide rate in the United States is among people ages 65 years and older. Almost 15% of people in this age group commit suicide every year.

Did you know?

Methicillin-resistant Staphylococcus aureus or MRSA was discovered in 1961 in the United Kingdom. It if often referred to as a superbug. MRSA infections cause more deaths in the United States every year than AIDS.

Methicilli ...
Did you know?

People who have myopia, or nearsightedness, are not able to see objects at a distance but only up close. It occurs when the cornea is either curved too steeply, the eye is too long, or both. This condition is progressive and worsens with time. More than 100 million people in the United States are nearsighted, but only 20% of those are born with the condition. Diet, eye exercise, drug therapy, and corrective lenses can all help manage nearsightedness.

Did you know?

Approximately 15–25% of recognized pregnancies end in miscarriage. However, many miscarriages often occur before a woman even knows she is pregnant.

Did you know?

Patients who have undergone chemotherapy for the treatment of cancer often complain of a lack of mental focus; memory loss; and a general diminution in abilities such as multitasking, attention span, and general mental agility.

For a complete list of videos, visit our video library