This topic contains a solution. Click here to go to the answer

Author Question: Which of the following is the protection of information against threats to its integrity, ... (Read 58 times)

Wadzanai

  • Hero Member
  • *****
  • Posts: 528
Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or availability?
 
  1. Information security
  2. Survivability
  3. Confidentiality
  4. Privacy

Question 2

Which of the following measures are recommended for enhancing information security? Select all that apply.
 
  1. File deletion software is used to overwrite hard disk files, using meaningless information.
  2. Storage media that has been erased is disposed of in the dumpster.
  3. Individuals routinely witness and record the destruction of records.
  4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the dumpster.
  5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

FergA

  • Sr. Member
  • ****
  • Posts: 352
Answer to Question 1

1
Rationale: Information security is the protection of information against threats to its integrity, inadvertent disclosure, or availability.

Answer to Question 2

1,3,5
Rationale: All papers containing personal health information (PHI) such as prescriptions, laboratory specimen labels, identification bracelets, meal descriptions, addressograph plates or any other items that carry a client's name, address, Social Security number, date of birth, or age must be destroyed. For tracking purposes, each page of output should have a serial number or other means of identification so that an audit trail is maintained that identifies what each paper record is as well as the date and method for destruction and the identity of individuals witnessing the destruction. Storage media should be destroyed or files electronically written over to ensure that no information can be retrieved from them. File deletion software overwrites files with meaningless information so that sensitive information cannot be accessed. Unauthorized or dormant e-mail accounts should be destroyed.




Wadzanai

  • Member
  • Posts: 528
Reply 2 on: Jul 7, 2018
Thanks for the timely response, appreciate it


recede

  • Member
  • Posts: 315
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

Hippocrates noted that blood separates into four differently colored liquids when removed from the body and examined: a pure red liquid mixed with white liquid material with a yellow-colored froth at the top and a black substance that settles underneath; he named these the four humors (for blood, phlegm, yellow bile, and black bile).

Did you know?

The immune system needs 9.5 hours of sleep in total darkness to recharge completely.

Did you know?

The longest a person has survived after a heart transplant is 24 years.

Did you know?

When blood is deoxygenated and flowing back to the heart through the veins, it is dark reddish-blue in color. Blood in the arteries that is oxygenated and flowing out to the body is bright red. Whereas arterial blood comes out in spurts, venous blood flows.

Did you know?

Throughout history, plants containing cardiac steroids have been used as heart drugs and as poisons (e.g., in arrows used in combat), emetics, and diuretics.

For a complete list of videos, visit our video library