1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
10

Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related t

o health care. Describe the incidents and explain what could have been done to prevent or mitigate them.
Computers and Technology
1 answer:
arsen [322]3 years ago
8 0

Answer:

Question: Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related to health care.

Answer:

1. TRICARE United States, in 2011:

2. University of Washington Medicine, in 2018

Question: Describe the incidents

Answer:

1. TRICARE:

As a  health care program of the United States Department of Defense Military Health System, TRICARE being overseen by Science Applications International Corporation (SAIC), the defense break also came through an employee of SAIC, the tapes that stores vital information of personnel were physically stolen, and these tapes contain vital information such as the Social Security numbers, phone numbers, prescriptions, of millions of active and retired military personnel.  

2. University of Washington Medicine:

Database which contains important data of over hundred thounsands patients were exposed as a internal files were able to be accessed to the public when searched on the internet as those files appeared saved in search results on search engine.

Question: explain what could have been done to prevent or mitigate them

Answer:

The following would prevented or mitigated the attack:

1. For security breach on TRICARE:

i. The security software should be updated.

ii. Data should be encrypted to further protect it.

iii. The data protection security policies should be reviewed to prevent future attacks.

2. For security breach on University of Washington Medicine:

i. There should be effective risk assessment that would data vulnerabilities.

ii. There should be a limit on internal human error, and sharing of data without adequate protection, encryption should be stoped.

You might be interested in
What is qwerty and why is it on the keyboard?
Genrish500 [490]

Answer:

qwerty is the main way people sort out there keyboard as you can see on the left side of the keyboard there is W,A,S,D

Explanation:

6 0
4 years ago
Read 2 more answers
Which of the following is used to allocate memory for the instance variables of an object of a class?1. the reserved word public
kodGreya [7K]

Answer:

The correct answer to the following question will be 2. the operator new.

Explanation:

New operator is used to allocating the memory to the instance object.The new object can be created by using a "new" keyword in java .

Syntax of using 'new' operator is :

class_name object_name=new class_name() // it allocated the memory to the class

For Example :

ABC obj = new ABC;  

Now, this time obj points to the object of the ABC class.

obj = new ABC ();

call the construction of ABC class

3 0
3 years ago
QUESTIONS Which of the following use cases are suitable for compute-optimized cloud offering? ОА. None of the listed O B. Highly
Ede4ka [16]

Answer:

E. All of the listed ​

Explanation:

For compute-optimized cloud offerings like AWS, suitable use cases are - gaming, distributed analytics, and scientific modeling. Since all these are suitable, the correct answer is E.

4 0
3 years ago
A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent fr
Keith_Richards [23]

Answer:

Packet

Explanation:

8 0
3 years ago
Game Design Help please
vova2212 [387]

Because, to put it simply, to use more complicated shapes requires more processing power which is unnecessary. Only if they would touch all parts of the shape should it be complicated.

5 0
3 years ago
Other questions:
  • Tag groups can be nested up to ____ levels deep, with up to _______ tag subgroups under a single parent.
    14·1 answer
  • Explain the concept of scalability. How would you respond?
    15·1 answer
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • What is the output of the following code? stackList stack; int x, y; x = 2; y = 3; stack.push(8); stack.push(x); stack.push(x +
    6·1 answer
  • What is the best prediction she could make about this
    15·2 answers
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.
    5·1 answer
  • How many months have 28 days?
    8·1 answer
  • Can anyone help explain this?
    13·2 answers
  • Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!