This topic contains a solution. Click here to go to the answer

Author Question: Which of the following is the protection of information against threats to its integrity, ... (Read 52 times)

Wadzanai

  • Hero Member
  • *****
  • Posts: 528
Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or availability?
 
  1. Information security
  2. Survivability
  3. Confidentiality
  4. Privacy

Question 2

Which of the following measures are recommended for enhancing information security? Select all that apply.
 
  1. File deletion software is used to overwrite hard disk files, using meaningless information.
  2. Storage media that has been erased is disposed of in the dumpster.
  3. Individuals routinely witness and record the destruction of records.
  4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the dumpster.
  5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

FergA

  • Sr. Member
  • ****
  • Posts: 352
Answer to Question 1

1
Rationale: Information security is the protection of information against threats to its integrity, inadvertent disclosure, or availability.

Answer to Question 2

1,3,5
Rationale: All papers containing personal health information (PHI) such as prescriptions, laboratory specimen labels, identification bracelets, meal descriptions, addressograph plates or any other items that carry a client's name, address, Social Security number, date of birth, or age must be destroyed. For tracking purposes, each page of output should have a serial number or other means of identification so that an audit trail is maintained that identifies what each paper record is as well as the date and method for destruction and the identity of individuals witnessing the destruction. Storage media should be destroyed or files electronically written over to ensure that no information can be retrieved from them. File deletion software overwrites files with meaningless information so that sensitive information cannot be accessed. Unauthorized or dormant e-mail accounts should be destroyed.




Wadzanai

  • Member
  • Posts: 528
Reply 2 on: Jul 7, 2018
:D TYSM


Hdosisshsbshs

  • Member
  • Posts: 315
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

Fewer than 10% of babies are born on their exact due dates, 50% are born within 1 week of the due date, and 90% are born within 2 weeks of the date.

Did you know?

Autoimmune diseases occur when the immune system destroys its own healthy tissues. When this occurs, white blood cells cannot distinguish between pathogens and normal cells.

Did you know?

About 3.2 billion people, nearly half the world population, are at risk for malaria. In 2015, there are about 214 million malaria cases and an estimated 438,000 malaria deaths.

Did you know?

Pink eye is a term that refers to conjunctivitis, which is inflammation of the thin, clear membrane (conjunctiva) over the white part of the eye (sclera). It may be triggered by a virus, bacteria, or foreign body in the eye. Antibiotic eye drops alleviate bacterial conjunctivitis, and antihistamine allergy pills or eye drops help control allergic conjunctivitis symptoms.

Did you know?

The Centers for Disease Control and Prevention (CDC) was originally known as the Communicable Disease Center, which was formed to fight malaria. It was originally headquartered in Atlanta, Georgia, since the Southern states faced the worst threat from malaria.

For a complete list of videos, visit our video library