How does your major relate to Cybersecurity Technology?
When it comes to Cybersecurity, I would say that the major that I currently have coincides with it very well. Currently, my major is cybersecurity exactly so it’s a bit difficult to talk about the relation between them when they are the exact same thing. As many know, this major includes the techniques and methods used to protect programs and data from being attacked, the integrity of various networks, and unauthorized access or damage to these networks or data. The major that I had previously could have some relation to this as well. When in the field of Information technology, a person would have a very different set of skills in contrast to cybersecurity. An IT person would have to worry about many of the hardware and software aspects of the job rather than just the software and monitoring network activity. The way that I look at it, when an IT specialist is called, there is a “fix – it” mentality there. Usually, there is something wrong with the hardware or network connections. In contrast, when a Cybersecurity specialist is called, something is in the need of being secured. But in certain cases, these specialists’ skills can intertwine to accomplish the same goal. For example, a person working in cybersecurity can assist in end-user developments just like an IT person would.
Describe four ethical issues that arise when storing electronic information about individuals.
When it comes to the electronic storage of a person’s personal records, otherwise known in the health field as an electronic health record (EHR), there are some factors that come into play when dealing with this type of data. Privacy and confidentiality, security breaches, system implementation, and data inaccuracies are four factors that need to be kept in mind. For privacy and confidentiality, this would be the right of the individual to keep the data about themselves undisclosed to unauthorized persons. The only time this information should be released is when it is through the patient’s permission or by law. In the case of when a patient is unable to consent to the disclosure, there can be a legal guardian that would have the authority on their behalf. A Security breach is a case when sensitive data has the ability to be compromised and when this happens, it can cause heavy repercussions on the individual responsible for the accessed information. For example, this could be a nurse that has access to a patient’s data but chooses to copy this data for misuse. This is a direct violation of HIPAA and can result in fines and jail time. For the implementation of their systems in this field, it would require efficient training and understanding, otherwise, quality care of patients would be more difficult to achieve. This can happen when there is a subpar user interface that if not redesigned early on, frustrations of the healthcare workers and patients will rise. Lastly, data inaccuracies can occur when faced with a few factors. The loss of data that happens during transfer causes concern for many because it diminishes the integrity of EHR. Also, the copy and paste functions, as well as drop-down menus can serve as a platform for user error when updating a patient’s file.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4394583/