What would you recommend to prevent a virus from entering

Assignment Help Accounting Basics
Reference no: EM13912940

1. Suppose the virus entered FAHC as they suspect. What would you recommend to prevent a virus from entering again the same way? Who has to follow this policy?
How would you train those people on the policy? Who should be responsible for that training? In the broadest possible sense, what does this virus incident suggest to you as a future manager for ensuring information system security at your company?
2. With 5,000 of its 6,000 computers uninfected based on their testing, FAHC was able to continue patient care, though some areas of the hospital did not function optimally. In a worst case scenario, the numbers could have been the other way round: 5,000 of 6,000 computers infected or even all 6,000. What do you think the impact on patient care would have been then? How would you go about minimizing it?

Reference no: EM13912940

Questions Cloud

How do proper security measures help ensure information : Why does information security usually come at the cost of user convenience? How do proper security measures help ensure information privacy?
Why do you think extending access to a corporate : Why do you think extending access to a corporate network beyond the business walls dramatically elevates the risk to information security? What tools and policies can be used to minimize that risk?
What key points would you make : You have just begun a new position in the Public Relations Department of the RIAA. You have been asked to prepare a one page summary defending the organization position against music piracy. What key points would you make?
What can a siem software vendor do to protect itself : Vendors and users are investing a great deal of money in applying big data methods to SIEM. If there is a less expensive way to achieve the same objective, someone will think of it and, if Stiennon is right, will obtain a competitive advantage by ..
What would you recommend to prevent a virus from entering : Suppose the virus entered FAHC as they suspect. What would you recommend to prevent a virus from entering again the same way? Who has to follow this policy?
Imagine that you are a hacker and have developed : Imagine that you are a hacker and have developed a Trojan horse program. What tactics might you use to get unsuspecting victims to load the program onto their computer?
What advice might you offer her about posting personal : Your 12 year old niece shows you a dozen or so innocent photos of herself and a brief biography, including address and cell phone number that she plans to post on Facebook. What advice might you offer her about posting personal information and photos..
Identify which federal law regulates the following : Identify which federal law regulates the following areas and situations: cross checking IRS and Social Security files to verify the accuracy of information, customer liability for debit cards, the right to access data contained in federal agency f..
What is meant by the separation of duties : What is meant by the separation of duties? When does this concept come into play? Provide a business situation where separation of duties is important.

Reviews

Write a Review

Accounting Basics Questions & Answers

  What is the amount of gargoyle purchases during the month

JJ Gargoyle Company is preparing their budget for next year. COGS sold has been estimated at fifty percent of sales. Product purchases and payments are to be made during the month preceding the month of sale.

  A corporation acquired a truck on july 1 2012 at a cost of

a corporation acquired a truck on july 1 2012 at a cost of 162000. the truck has a six-year useful life and an

  Inventory substantive testing

Inventory substantive testing

  What is the process for adjusting the value of a trading

what is the process for adjusting the value of a trading or available-for-sale security after a valuation account has

  Describe how this software controls shared access

What is the term for the software program(s) that monitors and organizes the database and controls access and use of data? Describe how this software controls shared access.

  Whitley corporation identified four operating segments

whitley corporation identified four operating segments automotive electrical lawn equipment and sporting goods.

  Assume no opening or closing stocks of the trimmer in each

northbank ltd has developed a unique hedge trimmer. market researchindicates that the demand for the trimmer at a unit

  Van frank telecommunications has a patent on a cellular

van frank telecommunications has a patent on a cellular transmission process. the company has amortized the patent on a

  The three products cost elements-direct material direct

the three products cost elements-direct material direct labor and overhead-flow through a job costing system in a

  Shiloh company was started in 2011 when it acquired 15000

shiloh company was started in 2011 when it acquired 15000 cash by issuing a common stock. the cash acquisition was the

  Coley co issued 30 million face amount of 9 10 year bonds

coley co. issued 30 million face amount of 9 10 year bonds on june 1 2010. the bonds pay interest on an annual basis on

  Designers consider the framework that structures information

When Web site designers consider the framework that structures the information in such a way that that it meets the goals and expectations of the user, they are considering:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd