Premium Essay

Catastrophic Cyberattack on the Health System

In:

Submitted By southernmom29
Words 1047
Pages 5
Catastrophic Cyberattack on the Health System
Over the couple decades the United States has taken on using more of the information technology systems. By doing this helps with sharing information quickly and efficiently. One of the changes that have come into this cyber system is the United States health care system. When it comes to a person’s health care having the information quickly can make a difference in a life. At the same time there are potential risks when sharing this kind of information over an internet connection.
Cyber-terrorism meaning is “an assault on electronic communication networks” (Dictionary.com. n.d. para. 1). If this happens to our health care system, the persons responsible could access information that is private. This happened to one hospital located in Bakersfield, California. The hospital was him with a virus attack that crippled the computer system. So the doctors and nurses at this hospital had to go back to using paper records for the patients. Attacks like this can be costly. It can cause delays in surgeries, important test results and cause the care to patients to be interrupted (UCDavis Health System, 2010).
With the health care systems moving into a digital world seems like a great idea. Back in 1999-2001 the health records of a service member and their family was done on paper. Every time a service member would move to a different base they had to go get those records and carry them to their next duty station. When I left Germany as a military spouse we could no longer carry our records. So I had to request them to be transferred from Germany to California. Somewhere along the way my records went missing, but my daughters records made it just fine.
When I left the military in 2005, all of our medical records where digital this made life a little easier for my care that I received at the local military

Similar Documents

Premium Essay

Cs Is Not Free

...and perhaps more alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb. When these words were written, the first web browsers were still on the drawing board and the Internet was a place for high-tech aficionados. How far we have come! Today, our dependence on inter-networked computing systems means that virtually every walk of American life—whether personal or commercial, public or private, civilian or military—is intermediated by computer systems. But virtually none of these systems are trustworthy; all are subject to attack; in fact, many are actively under attack today. It is 2009 and we very much remain a nation at risk. Moreover, we are embarking on a trajectory that will only put us further at risk as we revamp energy distribution, revitalize our transportation systems, and computerize our health care records. We have no basis to place our trust in such systems. We must learn to engineer our inter-networked systems and defend them, appreciating that they will constitute a new battlefront as they are deployed. Today’s landscape By virtually any...

Words: 2849 - Pages: 12

Premium Essay

Essentials of Management Information Systems

...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these...

Words: 21009 - Pages: 85

Premium Essay

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...

Words: 25389 - Pages: 102

Premium Essay

Ggao-09-232g

...United States Government Accountability Office GAO February 2009 GAO-09-232G FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL (FISCAM) This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office Washington, DC 20548 February 2009 TO AUDIT OFFICIALS, CIOS, AND OTHERS INTERESTED IN FEDERAL AND OTHER GOVERNMENTAL INFORMATION SYSTEM CONTROLS AUDITING AND REPORTING This letter transmits the revised Government Accountability Office (GAO) Federal Information System Controls Audit Manual (FISCAM). The FISCAM presents a methodology for performing information system (IS) control 1 audits of federal and other governmental entities in accordance with professional standards, and was originally issued in January 1999. We have updated the FISCAM for significant changes affecting IS audits. This revised FISCAM reflects consideration of public comments received from professional accounting and auditing organizations, independent public accounting firms, state and local audit organizations, and interested individuals on the FISCAM Exposure Draft issued on July 31, 2008 (GAO-08-1029G)...

Words: 174530 - Pages: 699

Premium Essay

Acquiring a Company

...One mission: 2013 Annual Report A history of delivering strong results More than Approximately Approximately 10,700 retail units operated in 27 countries 245M customers served weekly in our stores in 27 countries 75 % of U.S. store operations management joined Walmart as hourly associates Increase of Increase of More than 59% in earnings per share(1) (1) Data reflects five-year period from fiscal 2009 through 2013. 123% in free cash flow(1)(2) $ 60B returned to shareholders through dividends and share repurchases(1) (2) Free cash flow is a non-GAAP measure. Net cash provided by operating activities of continuing operations is the closest GAAP measure to free cash flow. Reconciliations and other information regarding free cash flow and its closest GAAP measure can be found in the Management’s Discussion and Analysis of Financial Condition and Results of Operations included in this Annual Report and on our website at www.stock.walmart.com. About the cover: Regardless of the market where we operate, the retail format or the website, Walmart serves customers with one core mission: to help people save money so they can live better. To learn more about Walmart’s business strategies and company mission, please visit our electronic report at www.stock.walmart.com. You’ll hear from management, associates and customers about our business. Many of Walmart’s most innovative ideas originate from the insights of associates across...

Words: 40535 - Pages: 163

Premium Essay

Financial

...One mission: 2013 Annual Report A history of delivering strong results More than Approximately Approximately 10,700 retail units operated in 27 countries 245M customers served weekly in our stores in 27 countries 75 % of U.S. store operations management joined Walmart as hourly associates Increase of Increase of More than 59% in earnings per share(1) (1) Data reflects five-year period from fiscal 2009 through 2013. 123% in free cash flow(1)(2) $ 60B returned to shareholders through dividends and share repurchases(1) (2) Free cash flow is a non-GAAP measure. Net cash provided by operating activities of continuing operations is the closest GAAP measure to free cash flow. Reconciliations and other information regarding free cash flow and its closest GAAP measure can be found in the Management’s Discussion and Analysis of Financial Condition and Results of Operations included in this Annual Report and on our website at www.stock.walmart.com. About the cover: Regardless of the market where we operate, the retail format or the website, Walmart serves customers with one core mission: to help people save money so they can live better. To learn more about Walmart’s business strategies and company mission, please visit our electronic report at www.stock.walmart.com. You’ll hear from management, associates and customers about our business. Many of Walmart’s most innovative ideas originate from the insights of associates across...

Words: 40535 - Pages: 163

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742