Identify security issues related to computer hardware, software, and data.

Identification should include a list of methods for preventing and consequences of dealing with

  • theft of equipment or intellectual property
  • loss or corruption of data through viruses
  • unauthorized entry into the computer system
  • accidental loss or corruption of data by a user or company
  • loss or theft of private company or customer information. 

Process/Skill Questions:

  • What is shoulder surfing?
  • What is an acceptable use policy (AUP)?
  • What is considered a strong password?
  • What is ransomware?
  • What are other potential threats to EHR?