Here is the synopsis of our sample research paper on SECURITY AT ST. JOHN’S HOSPITAL. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 7-page paper discusses information technology security protocols for St. John's Hospital. Bibliography lists 4 sources.
Page Count:
7 pages (~225 words per page)
File: AS43_MTsecustjo.doc
Buy This Term Paper »
 
Unformatted sample text from the term paper:
among these information systems. This, in turn, has led to a booming business in IT security tools, ranging from firewalls and password protection to keep out hackers, to anti-virus software
to catch and prevent worms, Trojan Horses, spyware and other malicious stuff from destroying records and software. Ultimately, though, all the anti-virus programs
and firewalls arent going to mean a thing if IT end users arent well-versed in their own roles in preventing breaches. This is the situation well examine with St. Johns
Hospital. St. Johns has implemented sound policies and procedures for the protection of confidential patient and client information. This organization is so strong
in security protection, it serves as a role model for other institutions in the area. However, its recently been discovered that printouts to be discarded in the restricted-access information systems
department arent destroyed or shredded - but simply tossed. On many occasions, St. Johns employees working late have noticed the cleaning staff reading discarded printouts. In other words, the restricted-access
IS department isnt quite so restricted-accessed as it might seem. The point here is that something needs to be done so sensitive information
isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The likelihood is strong that these documents arent shredded
because it didnt occur to anyone that unauthorized personnel had access to the premises. This is clearly a false assumption, and management will need to take quick action to prevent
sensitive information from being viewed, or even stolen. Managements Response Most experts agree that the largest security breach is the human one. This
...