E-Mail Address: support@nursingpaperacers.com
Whatsapp Chats: +1 (601) 227-3647
Discussion: Network Accessibility
NOW FOR AN ORIGINAL PAPER ASSIGNMENT:Discussion: Network Accessibility
Summary
Technology changes so quickly that even the most diligent user will likely encounter a situation that could constitute a threat to his or her network. Organizations must provide their users with the proper training to help them avoid known threats and—more importantly—be able to discern a possible new threat. Consider that 10 years ago wireless networks were the exception to the rule, where today access to wireless networks is almost taken for granted. How will computer networks be accessed 10 years from now? The most important concept to remember from this chapter is that the only completely safe network is one that is turned off. Network accessibility and network availability are necessary evils that pose security risks. The information must be available to be accessed, yet remain secured from hackers, unauthorized users, and any other potential security breaches. As the cloud expands, so do the concerns over security and privacy. In an ideal world, everyone would understand the potential threats to network security and would diligently monitor and implement tools to prevent unauthorized access of their networks, data, and information.
THOUGHT-PROVOKING QUESTIONS
1. Sue is a chronic obstructive pulmonary disorder clinic nurse enrolled in a master’s education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated repeat hospitalization of chronic obstructive pulmonary disorder patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that because she is a nurse and needs this information for a graduate school assignment, she is entitled to the information. Is Sue correct in her thinking? Describe why she is or is not correct.
2. The nursing education department of a large hospital system has been centralized; as a consequence, the nurse educators are no longer assigned to one hospital but must now travel among all of the hospitals. They use their smartphones to interact and share data and information. What are the first steps you would take to secure these transactions? Describe why each step is necessary.