Confidentiality And Aspects Of Computer Security

1611 Words4 Pages

Table of contents

1.0 Introduction

Computer Security is also known as Cyber Security or IT Security which means the applied security to computing devices such as computers and smartphones. This could also be a network, private as well as public including the Internet. Confidentiality, Integrity, Availability, Authenticity and Non-repudiation are considered as the aims of computer and information security.
Since data and Information is very much valuable in the cyber world, breach of data and information can be costly and also very dangerous. Since all data and information is in digital form, it’s easy for people who steal digital data (digital thieves), most commonly known as hackers, to steal data from any …show more content…

and it is sad to know that most of the time we give our information to them unknowingly. Once they get the information they sell your personal information in the black market for a high cost and as well as it is used to do illegal activities by hiding the true identity of the person who actually commits the crime and maybe those activities are done with your personal information.
The latest trend of stealing data is Medical data which is stored in digital form and it is updated all the time. Medical data about an individual is kept a secret since medical data theft is the leading data theft in the world now. Your medical information is worth 10 times more than your credit card number on the black market. (Reuters)
In this report it is discussed how the medical information is being theft and also the countermeasures taken to prevent or stop medical information theft in the future and make it more secure for people and to safe guard the aims of computer and information security by giving the best security over data and information and also to earn the trust of people who depend on cyber …show more content…

• Date of birth: $3
• Credit card number: $1.5
• Mother’s maiden name: $6
• Social security number: $3
• Medical record information: $6-50 (Disabled World)
As you can see the value placed for stolen medical record information is very high comparing with the credit card number.

2.2 What happens after the medical information has been stolen?
Stolen medical information such as insurance or electronic health record information is financially desirable for any person who stole information since he can submit inflated or false medical claims.
These records can be used in many ways such as;
• Purchase prescription medication
• Pay for medical care
• Receive treatments under a fake identity
These will cost the person whose records were stolen.

2.3 Organ trade
Stolen medical information can also be used for trading organs which is a rapidly developing business in the world. Stolen medical data can be used to identify sicknesses and buy body parts for a very high amount. Trading organs is illegal but if a person who has medical information he can possibly use those information to trade organs as well. Here are a few rates for organs in the

More about Confidentiality And Aspects Of Computer Security

Open Document