Discussion Post – Database Application(Enough Is Enough) And Data Security
NEED TO ANSWER ALL TWO DISCUSSION QUESTIONS…also specify which answer goes to which discussion question
When should a designer draw the line between what the user wants to what is feasible, beneficial and doable? What are some guidelines that should be followed?
Cyber security involves protecting information by preventing, detecting, and responding to attacks. Read these two articles:
Your Medical Records are Worth More to Hackers than your Credit Card https://content.learntoday.info/B351c_Spring_15/site/Media/Your%20Medical%20Records%20are%20worth%20more%20to%20Hackers%20than%20your%20Credit%20Card.pdf
Anthem Hacking https://content.learntoday.info/B351c_Spring_15/site/Media/Anthem%20Hacking.pdf
Next, comment on the following:
- What are your thoughts on cyber criminals stealing healthcare records?
- What do you think is causing this sudden increase in medical record theft?
- In your opinion, what are some of Anthem’s security weaknesses?
- Should Anthem be held responsible for damages? Why or why not?
- Be specific! Then provide thoughts and feedback on one other student’s post. How were your thoughts similar and different? What additional insight can you provide?