Discussion Post – Database Application(Enough Is Enough) And Data Security

NEED TO ANSWER ALL TWO DISCUSSION QUESTIONS…also specify which answer goes to which discussion question

question 1

When should a designer draw the line between what the user wants to what is feasible, beneficial and doable? What are some guidelines that should be followed?

question 2

Cyber security involves protecting information by preventing, detecting, and responding to attacks. Read these two articles:

Your Medical Records are Worth More to Hackers than your Credit Card https://content.learntoday.info/B351c_Spring_15/site/Media/Your%20Medical%20Records%20are%20worth%20more%20to%20Hackers%20than%20your%20Credit%20Card.pdf

Anthem Hacking https://content.learntoday.info/B351c_Spring_15/site/Media/Anthem%20Hacking.pdf

Next, comment on the following:

  • What are your thoughts on cyber criminals stealing healthcare records?
  • What do you think is causing this sudden increase in medical record theft?
  • In your opinion, what are some of Anthem’s security weaknesses?
  • Should Anthem be held responsible for damages? Why or why not?
  • Be specific! Then provide thoughts and feedback on one other student’s post. How were your thoughts similar and different? What additional insight can you provide?