Cmgt 441 Week 2 Information Security Paper

Topics: Computer security, Security, Information security Pages: 4 (1064 words) Published: May 28, 2012
Information Security: Detroit Hospital Security Breach
CMGT441: Introduction to Information Systems Security
TABLE OF CONTENTS

INTRODUCTION..................................................................................................................... 3

INCIDENT BACKGROUND................................................................................................... 3

REACTION TO INCIDENT.................................................................................................... 3

FUTURE RECOMMENDATIONS......................................................................................... 4
Training Classes.................................................................................................................... 4
Secured Property Location.................................................................................................... 4
Access Cards.......................................................................................................................... 5
Electronic Shut-Down Activation.......................................................................................... 5

CONCLUSION.......................................................................................................................... 5

REFERENCES.......................................................................................................................... 7 Information Security: Detroit Hospital Security Breach

    A breach in security can be a detrimental thing, especially if that breach brings about the appropriation of sensitive information by an outside source. In the context of this paper, sensitive information means names, dates of birth, personal records, or any other type of personal information that can be used to defraud an individual or a business. The outcome of such a breach in security is usually the same; the loss of monetary funds or the injury to...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cmgt week 2 Essay
  • Essay about Information Security Evaluation
  • Cmgt 400 Week 2 Common Information Security Threats Essay
  • Essay on Cmgt 441
  • CMGT 445 Week 2 IA Essay
  • Cmgt 400 Week 2 Essay
  • Week Four CMGT 400 Essay
  • Cmgt 441 Week 2 Essay

Become a StudyMode Member

Sign Up - It's Free