1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
10

Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related t

o health care. Describe the incidents and explain what could have been done to prevent or mitigate them.
Computers and Technology
1 answer:
arsen [322]3 years ago
8 0

Answer:

Question: Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related to health care.

Answer:

1. TRICARE United States, in 2011:

2. University of Washington Medicine, in 2018

Question: Describe the incidents

Answer:

1. TRICARE:

As a  health care program of the United States Department of Defense Military Health System, TRICARE being overseen by Science Applications International Corporation (SAIC), the defense break also came through an employee of SAIC, the tapes that stores vital information of personnel were physically stolen, and these tapes contain vital information such as the Social Security numbers, phone numbers, prescriptions, of millions of active and retired military personnel.  

2. University of Washington Medicine:

Database which contains important data of over hundred thounsands patients were exposed as a internal files were able to be accessed to the public when searched on the internet as those files appeared saved in search results on search engine.

Question: explain what could have been done to prevent or mitigate them

Answer:

The following would prevented or mitigated the attack:

1. For security breach on TRICARE:

i. The security software should be updated.

ii. Data should be encrypted to further protect it.

iii. The data protection security policies should be reviewed to prevent future attacks.

2. For security breach on University of Washington Medicine:

i. There should be effective risk assessment that would data vulnerabilities.

ii. There should be a limit on internal human error, and sharing of data without adequate protection, encryption should be stoped.

You might be interested in
Which of the following best describes a good role model?
Alex787 [66]

Answer:

b

Explanation:

i am not sure

5 0
4 years ago
Read 2 more answers
Who are all the fnaf characters?
vitfil [10]

Answer: Freddy Bonnie Chica Foxy Golden Freddy Endo 01 Toy Freddy Toy Bonnie Toy Chica Mangle Balloon Boy Marionette Withered Freddy Withered Bonnie Withered Chica Withered Foxy Withered Golden Freddy Shadow Freddy Shadow Bonnie Endo 02 JJ Phantom Freddy Phantom Balloon Boy Phantom Chica Phantom Foxy Phantom Mangle Phantom Puppet SpringTrap Nightmare Freddy Nightmare Bonnie Nightmare Chica Nightmare Foxy Nightmare Balloon Boy Nightmarionette Nightmare Nightmare FredBear Nightmare JJ Plushtrap.




Explanation: I can only tell you fnaf 1, fnaf 2, fnaf 3, fnaf 4

8 0
2 years ago
What was the first video game ever invented
Sever21 [200]

Answer:

Pong

Explanation:

In 1958, a physicist created a tennis game in which he found the very first video game.

3 0
4 years ago
Read 2 more answers
A collection of realated files is called a
Thepotemich [5.8K]

The answer to this question would be:

database/records

They all have in common the same files.

4 0
4 years ago
The command to delete all the files that have filenames that starts with letter c or c and ends with a letter z or z is
dimaraw [331]
The command is : <span>rm [Aa]*[Zz] </span>
4 0
3 years ago
Other questions:
  • How do humans feel about being abducted?
    12·2 answers
  • PLEASE HELP ITS DRIVERS ED
    8·2 answers
  • Can Someone give me a 5 paragraph essay about all of the uses in Microsoft Word.
    9·1 answer
  • A slideshow that accompanies an oral report is known as what?
    6·1 answer
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • Information management should supply information in the form of meaningful images rather than raw data, which requires that we h
    13·1 answer
  • In addition to ranking the relevance of a particular site according to the keywords entered by the user, which of the following
    10·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following
    11·1 answer
  • WILL GIVE BRAINLIEST! The command simplify is used if you only want the first two digits of a decimal to appear in the interpret
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!