SlideShare a Scribd company logo
1 of 28
Chapter 15
  Information Copyright and
Fair Use and Network Security
Objectives
• Explore information fair use and copyright
  restrictions.
• Describe processes for securing information in a
  computer network.
• Identify various methods of user authentication
  and relate authentication to security of a
  network.
• Explain methods to anticipate and prevent typical
  threats to network security.
Fair Use of Information and
              Sharing
• Copyright laws in the world of technology
  are notoriously misunderstood.
• The same copyright laws that cover
  physical books, artwork, and other creative
  material are still applicable in the digital
  world.
Fair Use of Information and
              Sharing
• Almost all software, music CDs, and movie DVDs
  come with restrictions of how and when copies
  may be made.
• Most computer software developers allow for a
  backup copy of the software without restriction.
• Technology advances have made the sharing of
  information easy and extremely fast, thus open to
  violations of copyright and fair use.
Fair Use of Information and
              Sharing
• Avoid downloading music illegally from the
  Internet and do not use information from the
  Internet without permission to do so or citing the
  reference appropriately.
• Health care organizations that allow access to the
  Internet from a network computer should ensure
  that users are well aware of and compliant with
  copyright and fair use principles.
Fair use
• Permits the limited use of original works
  without copyright holder’s permission.
• An example would be quoting or citing an
  author in a scholarly manuscript.
• The user is responsible for developing
  appropriate citations.
• Citing inappropriately or not at all is
  plagiarism.
Securing Network Information
• The linking of computers together and to
  the outside creates the possibility of a
  breach of network security, and exposes
  the information to unauthorized use.
• The three main areas of secure network
  information are confidentiality, availability,
  and integrity.
Confidentiality
• Safeguarding all personal information by
  ensuring that access is limited to only those
  who are authorized.
• “Shoulder surfing” or watching over
  someone’s back as they are working, is still
  a major way that confidentiality is
  compromised.
Acceptable Use
• Organizations protect the availability of
  their networks with an acceptable use
  policy.
• Defines the types of activities that are
  acceptable and not acceptable on the
  corporate computer network
• Defines the consequences for violations.
Information Integrity
• Quality and accuracy of networked
  information
• Organizations need clear policies to clarify:
  – how data is actually inputted,
  – who has the authorization to change such data
    and
  – to track how and when data are changed and
    by whom.
Authentication of Users
• Authentication of employees is also used
  by organizations in their security policies.
• Organizations authenticate by:
  – something the user knows (password),
  – something the user has (ID badge), or
  – something the user is (biometrics)
More About Authentication
• Policies typically include the enforcement
  of changing passwords every thirty or sixty
  days.
• Biometric devices include recognizing
  thumb prints, retina patterns or facial
  patterns.
• Organizations may use a combination of
  these types of authentication.
Threats to Security
• A 2003 nationwide survey by the Computing
  Technology Industry Association (CompTIA) found
  that human error was the most likely cause of
  problems with security breaches.
• The first line of defense is strictly physical.
• The power of a locked door, an operating system
  that locks down after five minutes of inactivity,
  and regular security training programs are
  extremely effective.
Threats to Security
• One way to address this physical security
  risk is to limit the authorization to ‘write’
  files to a device.
• Organizations are also ‘turning’ off the
  CD/DVD burners and USB ports on
  company desktops.
Threats to Security
• The most common threats a corporate
  network faces from the outside world are
  hackers, malicious code (spyware, viruses,
  worms, Trojan horses) and the malicious
  insider.
• Spyware is normally controlled by limiting
  functions of the browser used to surf the
  Internet.
Cookies
• A “cookie” is a very small file written to the
  hard drive of a user surfing the Internet.
• On the negative side, cookies can also
  follow the user’s travels on the Internet.
• Spying cookies related to marketing
  typically do not track keystrokes to steal
  user ids and passwords.
Threats to Security
• Spyware that does steal user ids and
  passwords contains malicious code that is
  normally hidden in a seemingly innocent
  file download.
• Another huge threat to corporate security
  is social engineering, or the manipulation of
  a relationship based on one’s position in an
  organization.
Malicious Insider
• The number one security threat to a
  corporate network is the malicious insider.
• There is also software available to track
  and thus monitor employee activity.
• Depending on the number of employees,
  organizations may also employ a full time
  electronic auditor who does nothing but
  monitor activity logs.
Security Tools
• There are a wide range of tools available to
  an organization to protect the
  organizational network and information.
• These tools can be either a software
  solution such as antivirus software or a
  hardware tool such as a proxy server.
Security Tools
• E-mail scanning software and antivirus
  software should never be turned off and
  updates should be run weekly, and ideally,
  daily.
• Software is also available to scan instant
  messages and to automatically delete spam
  e-mail.
Firewalls
• A firewall can be either hardware or
  software or a combination of both.
• A firewall can be set up to examines traffic
  to and from the network
• Firewalls are basically electronic security
  guards at the gate of the corporate
  network.
Proxy Servers
• Hardware security tool to help protect the
  organization against security breaches by:
  – preventing users from directly accessing the
    Internet from corporate computers.
  – Issuing masks to protect the identity of a
    corporation’s employees accessing the World
    Wide Web.
  – tracking which employees are using which
    masks and directing the traffic appropriately.
Intrusion detection systems
• Hardware and software to monitor who is
  using the organizational network and what
  files that user has accessed.
• Corporations must diligently monitor for
  unauthorized access of their networks.
• Remember: Any use of a secured network
  leaves a digital footprint that can be easily
  tracked by electronic auditing software.
Offsite Use of Portable Devices
• Off site uses of portable devices such as laptops,
  PDA’s, home computing systems, smart phones,
  and portable data storage devices can help to
  streamline the delivery of health care.
• Some agencies have developed a virtual private
  network (VPN) that the user must log in to in
  order to reach the network.
• The VPN ensures that all data transmitted via this
  gateway is encrypted.
Offsite Use of Portable Devices
• Only essential data for the job should be
  contained on the mobile device, and other non-
  clinical information such as a social security
  numbers should never be carried outside the
  secure network.
• The agency is ultimately responsible for the
  integrity of the data contained on these devices
  as required by HITECH and HIPAA regulations.
Offsite Use of Portable Devices
• If a device is lost or stolen, the agency must have clear
  procedures in place to help insure that sensitive data
  does not get released or used inappropriately.
• The Department of Health and Human Services (2006)
  identifies potential risks and proposes risk
  management strategies for accessing, storing, and
  transmitting EPHI. Visit this website for detailed
  tabular information (p 4-6) on potential risks and risk
  management strategies:
  http://www.cms.hhs.gov/SecurityStandard/Download
  s/SecurityGuidanceforRemoteUseFinal122806.pdf
Thought Provoking Questions
1. Jean, a diabetes nurse educator recently
  read an article in an online journal that she
  accessed through her health agency’s
  database subscription. The article provided
  a comprehensive checklist for managing
  diabetes in older adults that she prints and
  distributes to her patients in a diabetes
  education class. Does this constitute fair
  use or is this a copyright violation?
Thought Provoking Questions
2. Sue is a COPD clinic nurse enrolled in a Master’s
   education program. She is interested in writing a
   paper on the factors that are associated with poor
   compliance with medical regimens and associated
   re-hospitalization of COPD patients. She downloads
   patient information from the clinic database to a
   thumb drive that she later accesses on her home
   computer. Sue understands rules about privacy of
   information and believes that since she is a nurse
   and needs this information for a graduate school
   assignment that she is entitled to the information.
   Is Sue correct in her thinking?

More Related Content

What's hot

E. practice application
E. practice applicationE. practice application
E. practice applicationloveobi25
 
Nursing informatics.pptx
Nursing informatics.pptxNursing informatics.pptx
Nursing informatics.pptxBellaAlphonse
 
Health Information Technology & Nursing Informatics
Health Information Technology & Nursing InformaticsHealth Information Technology & Nursing Informatics
Health Information Technology & Nursing InformaticsJil Wright
 
Healthcare and Information Technology
Healthcare and Information TechnologyHealthcare and Information Technology
Healthcare and Information TechnologyJohn Cousins
 
Chapter 11
Chapter 11Chapter 11
Chapter 11bodo-con
 
1. nursing informatics lecture
1. nursing informatics lecture 1. nursing informatics lecture
1. nursing informatics lecture Peak Review/FSUU
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing InformaticsJadabear06
 
Introduction to Health Informatics
Introduction to Health InformaticsIntroduction to Health Informatics
Introduction to Health InformaticsMoustafa Hosni
 
The Internet (Nursing Informatics)
The Internet (Nursing Informatics)The Internet (Nursing Informatics)
The Internet (Nursing Informatics)Rendell Apalin
 
Clinical information system presentation
Clinical information system presentationClinical information system presentation
Clinical information system presentationbooob112
 
Issues in informatics
Issues in informaticsIssues in informatics
Issues in informaticsloveobi25
 
Perioperative Nursing Presentation
Perioperative Nursing PresentationPerioperative Nursing Presentation
Perioperative Nursing Presentationshenell delfin
 
The Impact Of Information Technology (IT) On The Healthcare Sector
The Impact Of Information Technology (IT) On The Healthcare SectorThe Impact Of Information Technology (IT) On The Healthcare Sector
The Impact Of Information Technology (IT) On The Healthcare SectorInnoTech Solutions
 

What's hot (20)

Nursing informatics Lecture
Nursing informatics LectureNursing informatics Lecture
Nursing informatics Lecture
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
New nursing informatics by heena
New nursing informatics by  heenaNew nursing informatics by  heena
New nursing informatics by heena
 
E. practice application
E. practice applicationE. practice application
E. practice application
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Nursing informatics.pptx
Nursing informatics.pptxNursing informatics.pptx
Nursing informatics.pptx
 
Health Information Technology & Nursing Informatics
Health Information Technology & Nursing InformaticsHealth Information Technology & Nursing Informatics
Health Information Technology & Nursing Informatics
 
Healthcare and Information Technology
Healthcare and Information TechnologyHealthcare and Information Technology
Healthcare and Information Technology
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
1. nursing informatics lecture
1. nursing informatics lecture 1. nursing informatics lecture
1. nursing informatics lecture
 
Standardized Terminologies for EHRs
Standardized Terminologies for EHRsStandardized Terminologies for EHRs
Standardized Terminologies for EHRs
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing Informatics
 
Introduction to Health Informatics
Introduction to Health InformaticsIntroduction to Health Informatics
Introduction to Health Informatics
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
The Internet (Nursing Informatics)
The Internet (Nursing Informatics)The Internet (Nursing Informatics)
The Internet (Nursing Informatics)
 
Clinical information system presentation
Clinical information system presentationClinical information system presentation
Clinical information system presentation
 
Issues in informatics
Issues in informaticsIssues in informatics
Issues in informatics
 
Perioperative Nursing Presentation
Perioperative Nursing PresentationPerioperative Nursing Presentation
Perioperative Nursing Presentation
 
The Impact Of Information Technology (IT) On The Healthcare Sector
The Impact Of Information Technology (IT) On The Healthcare SectorThe Impact Of Information Technology (IT) On The Healthcare Sector
The Impact Of Information Technology (IT) On The Healthcare Sector
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 

Similar to Ch15 power point

Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptWilsonWanjohi5
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Presentation2 (2)
Presentation2 (2)Presentation2 (2)
Presentation2 (2)ITNet
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 

Similar to Ch15 power point (20)

Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Unit v
Unit vUnit v
Unit v
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Presentation2 (2)
Presentation2 (2)Presentation2 (2)
Presentation2 (2)
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 

More from bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7bodo-con
 

More from bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Ch15 power point

  • 1. Chapter 15 Information Copyright and Fair Use and Network Security
  • 2. Objectives • Explore information fair use and copyright restrictions. • Describe processes for securing information in a computer network. • Identify various methods of user authentication and relate authentication to security of a network. • Explain methods to anticipate and prevent typical threats to network security.
  • 3. Fair Use of Information and Sharing • Copyright laws in the world of technology are notoriously misunderstood. • The same copyright laws that cover physical books, artwork, and other creative material are still applicable in the digital world.
  • 4. Fair Use of Information and Sharing • Almost all software, music CDs, and movie DVDs come with restrictions of how and when copies may be made. • Most computer software developers allow for a backup copy of the software without restriction. • Technology advances have made the sharing of information easy and extremely fast, thus open to violations of copyright and fair use.
  • 5. Fair Use of Information and Sharing • Avoid downloading music illegally from the Internet and do not use information from the Internet without permission to do so or citing the reference appropriately. • Health care organizations that allow access to the Internet from a network computer should ensure that users are well aware of and compliant with copyright and fair use principles.
  • 6. Fair use • Permits the limited use of original works without copyright holder’s permission. • An example would be quoting or citing an author in a scholarly manuscript. • The user is responsible for developing appropriate citations. • Citing inappropriately or not at all is plagiarism.
  • 7. Securing Network Information • The linking of computers together and to the outside creates the possibility of a breach of network security, and exposes the information to unauthorized use. • The three main areas of secure network information are confidentiality, availability, and integrity.
  • 8. Confidentiality • Safeguarding all personal information by ensuring that access is limited to only those who are authorized. • “Shoulder surfing” or watching over someone’s back as they are working, is still a major way that confidentiality is compromised.
  • 9. Acceptable Use • Organizations protect the availability of their networks with an acceptable use policy. • Defines the types of activities that are acceptable and not acceptable on the corporate computer network • Defines the consequences for violations.
  • 10. Information Integrity • Quality and accuracy of networked information • Organizations need clear policies to clarify: – how data is actually inputted, – who has the authorization to change such data and – to track how and when data are changed and by whom.
  • 11. Authentication of Users • Authentication of employees is also used by organizations in their security policies. • Organizations authenticate by: – something the user knows (password), – something the user has (ID badge), or – something the user is (biometrics)
  • 12. More About Authentication • Policies typically include the enforcement of changing passwords every thirty or sixty days. • Biometric devices include recognizing thumb prints, retina patterns or facial patterns. • Organizations may use a combination of these types of authentication.
  • 13. Threats to Security • A 2003 nationwide survey by the Computing Technology Industry Association (CompTIA) found that human error was the most likely cause of problems with security breaches. • The first line of defense is strictly physical. • The power of a locked door, an operating system that locks down after five minutes of inactivity, and regular security training programs are extremely effective.
  • 14. Threats to Security • One way to address this physical security risk is to limit the authorization to ‘write’ files to a device. • Organizations are also ‘turning’ off the CD/DVD burners and USB ports on company desktops.
  • 15. Threats to Security • The most common threats a corporate network faces from the outside world are hackers, malicious code (spyware, viruses, worms, Trojan horses) and the malicious insider. • Spyware is normally controlled by limiting functions of the browser used to surf the Internet.
  • 16. Cookies • A “cookie” is a very small file written to the hard drive of a user surfing the Internet. • On the negative side, cookies can also follow the user’s travels on the Internet. • Spying cookies related to marketing typically do not track keystrokes to steal user ids and passwords.
  • 17. Threats to Security • Spyware that does steal user ids and passwords contains malicious code that is normally hidden in a seemingly innocent file download. • Another huge threat to corporate security is social engineering, or the manipulation of a relationship based on one’s position in an organization.
  • 18. Malicious Insider • The number one security threat to a corporate network is the malicious insider. • There is also software available to track and thus monitor employee activity. • Depending on the number of employees, organizations may also employ a full time electronic auditor who does nothing but monitor activity logs.
  • 19. Security Tools • There are a wide range of tools available to an organization to protect the organizational network and information. • These tools can be either a software solution such as antivirus software or a hardware tool such as a proxy server.
  • 20. Security Tools • E-mail scanning software and antivirus software should never be turned off and updates should be run weekly, and ideally, daily. • Software is also available to scan instant messages and to automatically delete spam e-mail.
  • 21. Firewalls • A firewall can be either hardware or software or a combination of both. • A firewall can be set up to examines traffic to and from the network • Firewalls are basically electronic security guards at the gate of the corporate network.
  • 22. Proxy Servers • Hardware security tool to help protect the organization against security breaches by: – preventing users from directly accessing the Internet from corporate computers. – Issuing masks to protect the identity of a corporation’s employees accessing the World Wide Web. – tracking which employees are using which masks and directing the traffic appropriately.
  • 23. Intrusion detection systems • Hardware and software to monitor who is using the organizational network and what files that user has accessed. • Corporations must diligently monitor for unauthorized access of their networks. • Remember: Any use of a secured network leaves a digital footprint that can be easily tracked by electronic auditing software.
  • 24. Offsite Use of Portable Devices • Off site uses of portable devices such as laptops, PDA’s, home computing systems, smart phones, and portable data storage devices can help to streamline the delivery of health care. • Some agencies have developed a virtual private network (VPN) that the user must log in to in order to reach the network. • The VPN ensures that all data transmitted via this gateway is encrypted.
  • 25. Offsite Use of Portable Devices • Only essential data for the job should be contained on the mobile device, and other non- clinical information such as a social security numbers should never be carried outside the secure network. • The agency is ultimately responsible for the integrity of the data contained on these devices as required by HITECH and HIPAA regulations.
  • 26. Offsite Use of Portable Devices • If a device is lost or stolen, the agency must have clear procedures in place to help insure that sensitive data does not get released or used inappropriately. • The Department of Health and Human Services (2006) identifies potential risks and proposes risk management strategies for accessing, storing, and transmitting EPHI. Visit this website for detailed tabular information (p 4-6) on potential risks and risk management strategies: http://www.cms.hhs.gov/SecurityStandard/Download s/SecurityGuidanceforRemoteUseFinal122806.pdf
  • 27. Thought Provoking Questions 1. Jean, a diabetes nurse educator recently read an article in an online journal that she accessed through her health agency’s database subscription. The article provided a comprehensive checklist for managing diabetes in older adults that she prints and distributes to her patients in a diabetes education class. Does this constitute fair use or is this a copyright violation?
  • 28. Thought Provoking Questions 2. Sue is a COPD clinic nurse enrolled in a Master’s education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated re-hospitalization of COPD patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that since she is a nurse and needs this information for a graduate school assignment that she is entitled to the information. Is Sue correct in her thinking?