Arkansas Baptist College Computer Science Paper

User Generated

znnuvx111

Computer Science

Arkansas Baptist College

Description

1 .Read three articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Required Readings

https://searchsecurity.techtarget.com/feature/Redu...

https://www.bcs.org/content/ConWebDoc/8852

Videos which might help

Principle of Least Privilege

Patch Management

Vulnerability Prioritization and Detection: Common Vulnerability Scoring System (CVSS)

Patch Management for Windows

2.Write an essay of at least 500 words analyzing explaining how hackers benefit from stealing medical records. Use an example from the news.

Explanation & Answer:
500 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

Running Head: HACKERS

1

HACKERS
Student’s Name
Institution
Date

HACKERS

2

According to research, every year, hackers get access to thousands of medical records in
both hospitals and medical organizations and then steals them. After the act of stealing, they sell
the files on the darknet and ends up gaining thousands of dollars. The stolen records help them
perform a lot of tasks and make a lot of profits within a short period “and also launch
applications with the few privileges as possible. The principle of this privilege is widely
recognized as an importance design consideration and enhancing the protection of data and the
functionality from faults tolerance and malicious behavior computer security”
(https://www.youtube.com/watch?v=LblRSUeogZU&authuser=0).

According to HHS' Office of Inspector General, after making investigations on about
400 reports of stolen medical data, 222 health care data got tracked by the Protenus cybersecurity
during the year 2018. These have increased by 25% since the year 2017. Gary Cantrell says that
hackers steal the medical records mainly because they love a treasure trove of any information
concerning the patient. The report includes the patients' full name, financial information, address
history, and social security. By use of the data, the hackers will get able to access loans and set
up a line of credit below the name of the client. Another factor that leads to the hacking of the
medical records it's because hospitals and healthcare organizations get easy to hack. According
to Dave Kennedy, hospitals have low security since they give each attendant to access the syst...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags