discussion 6 reply and discussion 9

How can organizational management test their firewall security?
words : 350
Main que :
Chapter 6 covers Security and Privacy of Health Information, specifically HIPAA laws. Why would hackers be interested in stealing medical information? Is blackmail a motive? How would a hacker monetize medical records they’ve stolen?
Answer the question with a short paragraph, between 150 and 250 words. Brevity is a virtue. That is why you are limited to 250 words. If you can’t present your hypothesis in 250 words or less then it is too complicated.
sri-
Health insurance credentials are especially valuable in today’s economy because health care costs are causing people to seek free medical care with these credentials. The importance of Health information for health IT is to provide a better quality service to the patient depending on his/her health history. This History of medical is very important sometimes the loss of history may lead to danger for the patient because if no proper history found there may be wrong medication to patients by medical experts. The hackers are interested in stealing medical information because after stealing it might be sold to the health insurance companies for tracking or do some illegal activity etc.
After stealing the medical information from the highly secured servers they may blackmail the patient after going through the medical history of the patient or maybe a motive to do damage if any vengeance(Armstrong, et, al, 2005).
Sometimes, hackers want to steal your data so that they can hold it for ransom. This type of attack is a ransomware attack. Hackers usually execute ransomware attacks by gaining unauthorized access to data, then encrypting it or moving it and charging a ransom in order to restore your access to it. On the black market, the going rate for your social security number is 10 cents. Your credit card number is worth 25 cents. But your electronic medical health record(EHR) could be worth hundreds or even thousands of dollars.
Hackers have devised numerous ways to steal important data which is then put to misuse. Phishing is a fake email masquerading as legitimate. Hackers create phishing emails through which they intend to steal your confidential information like passwords and bank account details.(Wilson, 2006).
 
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”
The post discussion 6 reply and discussion 9 appeared first on Graduate Paper Help.

"Is this question part of your assignment? We will write the assignment for you. Click order now and get up to 40% Discount"