Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please proofread this essay for me; any correction would be greatly appreciate Security measures are steps taken for an organization or a country to minimize

please proofread this essay for me; any correction would be greatly appreciate

Security measures are steps taken for an organization or a country to minimize terrorism or and criminal action. It is a way for organization to protect themselves against unauthorized activities such as espionage, theft, and more. For instance, the United State of America had taken appropriated security measures such as limited the entrance and screen check everyone coming into the country to protect the population from the Covid-19 outbreak. Types of security measures for a healthcare organization include but not limited to security camera, an after hour access code to the building, a personalize user name, a strong password, firewall set up, antivirus protection, and monitoring all access into the systems.

Access control and authentication

Access controls in organizations are system software designed to prevent unauthorized personal the access to private or secure information. Access control is a fundamental security of organizational data which allow or not allow the access to data files through proper identification and codes required by the company. Moreover, anyone who owned a smart device such as computer, tablet, and phone should have a minimum type of access prevention to secure their information from thefts and espionage. For instance, let's say someone is stalking you and you get interned in the hospital, the stalker may have a gout to show up at the hospital and present his or her self as one of the healthcare team and try to use a hospital computer to access your information if there is not an access control and authentication.

The authentication main function in organization is to limit the access to private files such as patients' personal and health information. Authentication is a process by which the system verifies the identity of any user who wishes to enter the system. An authentication should content at least two factors to allows a user to enter the system or data. Employees with different titles should obviously have different authorization access control since there are working in different positions. For instance, in the hospital settings a lab technician is allow to view different things than an x-ray technician or an register nurse (RN) and a certified nurse assistant (CNA) which are both working on the same patient at the same time must have different access code and authentication because each one of them is limited to a certain extent of the patient's electronic health record.

"The Security Rule is designed to ensure that ePHI remains confidential and is protected from unauthorized disclosure, alteration, or destruction. The Security Rule utilizes administrative, physical, and technical safeguards to protect ePHI. Administrative safeguards are people-focused and include requirements such as training, policies, and assignment of an individual responsible for security. Physical safeguards are mechanisms in place to protect hardware, software, and data. The physical safeguards should protect ePHI from fire, flooding, unauthorized access to hardware, theft, and other hazards. Technical safeguards use technology to protect data and to control access to the data." (Sayles, 2018)

It is very important for organization particularly for healthcare to protect their data because their systems content a large group of people' personal information that must be keep safe and secure. The Heath Insurance Portability and Accountability Act (HIPAA) regulations of healthcare clearly state that patients' demographic information such as gender, birthdate, and ethnicity and or health information such as diagnostics, test results, and treatment must be keep private and secure; that is one of the reasons why healthcare organizations owned and maintain proper security measurement for patients' data. Tacking suitable measure to protect patients' and or employees' information is comparable to a nation protecting their people against a pandemic such as Covid-19 or the Ebola pandemic. If it was not for the appropriate action taken by the leaders in different nations, maybe one of these pandemics had turn out to become World War III or anything else.

"The Ebola pandemic in West Africa threatened political stability in the affected regions. Pacific regional stability could be similarly threatened. Calculators such as the IHR costing tool can be used to estimate the cost of sustainable capacity development to prevent, detect, and respond to public health threats, as defined by the IHR. New Zealand could target aid in ways that will allow Pacific nations to comply with the IHR and at the same time improve their GHSI. If New Zealand continues to give less and less ODA while its own GNI rises, then this neglect will likely further contribute to regional inequality and poor regional health security." (Boyd et al, 2020)

Conclusion

Security measures as it means are appropriate action taken by organizations' leaders to maintain a safe workplace environment for employees and clients. The access control method and the authentication system are both effective means to safeguard the interactive security between the users and the resources.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Quantitative Methods For Business

Authors: David Anderson, Dennis Sweeney, Thomas Williams, Jeffrey Cam

11th Edition

978-0324651812, 324651813, 978-0324651751

More Books

Students also viewed these General Management questions

Question

please try to give correct answer 1 8 3 .

Answered: 1 week ago