Unauthorised users can gain take advantage of
vulnerability of network and extract patient health information without the
consent of an organisation through:
vulnerability of network and extract patient health information without the
consent of an organisation through:
·
Cross-site Scripting: A malicious web developer may attach a script to
something sent to a web site, such as a URL, an element in a form, or a
database inquiry. Later, when the web site responds to you, the malicious
script is transferred to your browser. You can potentially expose your web
browser to malicious scripts by following links in web pages, email messages, or newsgroup postings without
knowing what they link tousing interactive forms on an untrustworthy site viewing online discussion groups, forums, or other dynamically generated pages
where users can post text containing HTML tags
Cross-site Scripting: A malicious web developer may attach a script to
something sent to a web site, such as a URL, an element in a form, or a
database inquiry. Later, when the web site responds to you, the malicious
script is transferred to your browser. You can potentially expose your web
browser to malicious scripts by following links in web pages, email messages, or newsgroup postings without
knowing what they link tousing interactive forms on an untrustworthy site viewing online discussion groups, forums, or other dynamically generated pages
where users can post text containing HTML tags
·
Packet Sniffing: A packet sniffer is a program that captures data
from information packets as they travel over the network. That data may include
user names, passwords, and proprietary information that travels over the
network in clear text. A packet sniffer installed on any cable modem user’s
computer in a neighborhood may be able to capture data transmitted by any other
cable modem in the same neighborhood.
Packet Sniffing: A packet sniffer is a program that captures data
from information packets as they travel over the network. That data may include
user names, passwords, and proprietary information that travels over the
network in clear text. A packet sniffer installed on any cable modem user’s
computer in a neighborhood may be able to capture data transmitted by any other
cable modem in the same neighborhood.
·
Denial of Service: This is a form of attack which causes your computer
to crash or to become so busy processing data that you are unable to use it. It
is important to note that in addition to being the target of a DoS attack, it
is possible for your computer to be used as a participant in a
denial-of-service attack on another system.
Denial of Service: This is a form of attack which causes your computer
to crash or to become so busy processing data that you are unable to use it. It
is important to note that in addition to being the target of a DoS attack, it
is possible for your computer to be used as a participant in a
denial-of-service attack on another system.
·
Unprotected Windows Shares:
Unprotected Windows networking shares can be exploited
by intruders in an automated way to place tools on large numbers of
Windows-based computers attached to the Internet. tools. This types of threat
includes malicious and destructive code, such as viruses or worms, which
leverage unprotected Windows networking shares to propagate.
Unprotected Windows Shares:
Unprotected Windows networking shares can be exploited
by intruders in an automated way to place tools on large numbers of
Windows-based computers attached to the Internet. tools. This types of threat
includes malicious and destructive code, such as viruses or worms, which
leverage unprotected Windows networking shares to propagate.
·
Mobile code
(Java/JavaScript/ActiveX): These are programming
languages that let web developers write code that is executed by your web
browser. Although the code is generally useful, it can be used by intruders to
gather information (such as which web sites you visit) or to run malicious code
on your computer.
Mobile code
(Java/JavaScript/ActiveX): These are programming
languages that let web developers write code that is executed by your web
browser. Although the code is generally useful, it can be used by intruders to
gather information (such as which web sites you visit) or to run malicious code
on your computer.