Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Problem 1: Assume you are asked to assess the security of an electronic medical

ID: 3828228 • Letter: P

Question

Problem 1: Assume you are asked to assess the security of an electronic medical record(EMR) system. List and (very briefly) explain what security vulnerabilities you would look for.

The following are some of the security vulnerabilities that I would look for in Electronic Medical Records(EMR).They are:

1.Theft:
Lost or stolen data was one of the biggest security vulnerabilities that has been observing from the past years and still continuing in many places. So this vulnerability should be handled carefully in order to avoid many negative instances. Medical information of more than 5 million people have been stolen by simple stealing the computer from the respective place.

2.Dispersal of data:
Many things having been taking place in EMR now-a-days that circulation of data in a wrong way is being done everywhere. This includes many technologies with weak controls like FTP sites, which has a lack of security. Organizations involved in transmission of data must concentrate on latest technologies that provides the best security to protect the data without circulating outside.

3.Outsourcing:
This process namely outsourcing has became more popular outside these days and more common in health institutions. Various suppliers, vendors and partners should follow some regulations like HIPAA compliance for better security reasons.

Explanation / Answer

The next are some of the security vulnerabilities that I would look for in Electronic Medical Records (EMR).They are:

1. Theft:

Lost or stolen data was one of the biggest refuge vulnerabilities that has been observe on or after the past years in addition to still long-lasting in many places. So this susceptibility be supposed to be handled carefully inside order to keep away from many negative instances. Medical information of more than 5 million people has been stolen by simple robbery the computer from the individual place.

2. Dispersal of data:

Many belongings have been taking put in EMR these days that circulation of data out a wrong way is life form done everywhere. This includes much technology with feeble wheel like FTP sites, which has a lack of security. Organization involved in broadcast of data must focus on latest technology that provides the best safety to protect the information without circulate outside.

3. Outsourcing:

This process that is to say outsourcing has became more accepted outside these days and more common during health institutions. Various suppliers, vendor and associates should go behind some system like HIPAA disobedience for better sanctuary reason