CONTENT:
HOW THE HEALTHCARE INDUSTRY COPES WITH COMPUTER HACKING IN THEIR TECHNOLOGICAL SYSTEMS: A CASE OF US Name:Institution:Course Title:Course Code:Instructor`s Name:Date Due:Table of Contents TOC o "1-3" h z u HYPERLINK l "_Toc346661030" Executive Summary PAGEREF _Toc346661030 h 3 HYPERLINK l "_Toc346661031" Introduction PAGEREF _Toc346661031 h 4 HYPERLINK l "_Toc346661032" Literature Review PAGEREF _Toc346661032 h 5 HYPERLINK l "_Toc346661033" Conclusion PAGEREF _Toc346661033 h 7 HYPERLINK l "_Toc346661034" Reference PAGEREF _Toc346661034 h 7Executive SummaryIn recent years, the cyber crime rate, computer hacking as well as virus attacks has been consistently on the rise globally. Persistent security breaches have ended up causing damages to the organizations IS (Ogut, 2006). Many of these Organizations have in turn tended to use different security technologies such as intrusion detection system, firewalls, biometric, encryption and other authentication system to deter these problems. However, studies reveal that it is not an easy task to eliminate or prevent these breaches from happening. This has led to many organizations using other tools such as insurance to cater for the losses emanating from the security breaches. Although these technological instruments are poised to reduce vulnerabilities and losses, how many firms manage their IT security risks is not yet clear to many. The last decade has seen the IT sector evolve from one stage to another. These information systems have enhanced the operations of many organizations and the connection between them and their clients. The IT has enabled many of these businesses to thrive in various aspects and even become major operators in the global economy. The closeness of the organizations with their customers has unfortunately made them to be vulnerable with regard to unprecedented technology risks. Whitman, (2004) observes that, the evolution of security t...