Identify security issues related to computer hardware, software, and data.
Identification should include a list of methods for preventing and consequences of dealing with
- theft of equipment or intellectual property
- loss or corruption of data through viruses
- unauthorized entry into the computer system
- accidental loss or corruption of data by a user or company
- loss or theft of private company or customer information.
Process/Skill Questions:
- What is shoulder surfing?
- What is an acceptable use policy (AUP)?
- What is considered a strong password?
- What is ransomware?
- What are other potential threats to EHR?