The following are some of the various ways
unauthorized users extract patient’s health information without the consent an
organization which include:
unauthorized users extract patient’s health information without the consent an
organization which include:
a.
Unprotected Windows Shares: Unprotected
Windows networking shares can be exploited by intruders in an automated way to
place tools on large numbers of Windows-based computers attached to the
Internet. Another threat includes malicious and destructive code, such as
viruses or worms, which leverage unprotected Windows networking shares to
propagate.
Unprotected Windows Shares: Unprotected
Windows networking shares can be exploited by intruders in an automated way to
place tools on large numbers of Windows-based computers attached to the
Internet. Another threat includes malicious and destructive code, such as
viruses or worms, which leverage unprotected Windows networking shares to
propagate.
b.
Introducing Trojan Horse Programmes:
Trojan horse programmes are common way for
intruders to trick organisation computer system users into installing
“back door” programmes. These can allow intruders easy access to
their computer without their knowledge and change your system configurations.
Introducing Trojan Horse Programmes:
Trojan horse programmes are common way for
intruders to trick organisation computer system users into installing
“back door” programmes. These can allow intruders easy access to
their computer without their knowledge and change your system configurations.
c.
Back Door and Remote Administration
Programs: On Windows computers, three tools commonly used by
intruders to gain remote access to your computer are BackOrifice, Netbus, and
SubSeven. These back door or remote administration programs, once installed,
allow other people to access and control your computer.
Back Door and Remote Administration
Programs: On Windows computers, three tools commonly used by
intruders to gain remote access to your computer are BackOrifice, Netbus, and
SubSeven. These back door or remote administration programs, once installed,
allow other people to access and control your computer.
d.
Denial of Service: Another
form of attack is called a denial-of-service (DoS) attack. This type of attack
causes your computer to crash or to become so busy processing data that you are
unable to use it. It is important to note that in addition to being the target
of a DoS attack, it is possible for your computer to be used as a participant
in a denial-of-service attack on another system.
Denial of Service: Another
form of attack is called a denial-of-service (DoS) attack. This type of attack
causes your computer to crash or to become so busy processing data that you are
unable to use it. It is important to note that in addition to being the target
of a DoS attack, it is possible for your computer to be used as a participant
in a denial-of-service attack on another system.