Texas Health Science Center Threats

Superior Essays
In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and …show more content…
Prior to earning it’s present name however, it was first designated as the South Texas Medical School. Although the school didn’t begin it’s construction until 1966 and finished in mid 1968, staff members were able to come onboard “as early as 1965, and students enrolled by 1966, but they attended classes in Dallas and Galveston until 1969” (Aust). The Health Science Center consists of 8 separate schools occupying an area of approximately one square kilometer. The school offers a total of 65 different degree plans, about 28,000 graduates, 3,000 students a …show more content…
As such, it is only natural to guess that there are many stakeholders that play a part in the operations, development, and decision-making process at the Health and Sciences center. Some of the more general are patients who receive care at the center, vendors, sponsors, various members of staff, and also alumni. The team was able to identify additional stakeholders through the use of a handbook available to the public. Some of the more interesting to note are Michael Schnabel (CISO), Yeman Collier (VP & CIO), and Amar Yousif (offsite ISO). These three individuals are identified the key stakeholders, also executives, who are involved in the integrity of the data at the

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Remote access to the UHS FUSION/Cerner Millennium Application Portal is available with the use of Citrix Web-Plugin once the user requests access through the Information Technology department. All passwords created to access the portal, which expires every 90 days, must be strong passwords in order maintain secure and protection from unauthorized access, as well as confidentiality. Since electronic health records are easier to access, making them also easer to exploit, access to patient information is based on criteria that is relevant to an individual’s position. As an additional measure of security, an Information Technology Security Officer conducts audits to the computer system’s activity at Summerlin Hospital Medical Center to check for any signs of abuse of the security policy. Other improved patient information security measures have been bar code technology in order to verify the medication and dosage, as well as warnings that alert healthcare providers about allergies and…

    • 1863 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Stakeholders influence on SWOT elements Internal stakeholders include doctors, subordinate staff, managers, patients, and payers. Additionally, internal stakeholders can affect the operations of the hospitals directly. In contrast, the external stakeholders include government, suppliers, and community. First managers of the company are responsible for outsourcing funds from grants, donors, and the government to support delivery and affordability of its health care services. Furthermore, the managers are responsible for acquiring modern technology that assists doctors to carry their diagnosis and treatment.…

    • 965 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Strengths- University Health System, San Antonio, Texas, is the only hospital in San Antonio to have the Magnet health system status. Magnet status is a credential awarded by the American Nurses Association. It is awarded for the expertise in nursing staff in providing quality care. Apart from this UHS has Board certified emergency care physicians. Hence, it is evident from these strengths about why University Health system is reported as the best in San Antonio, and sixth best in Texas by the U.S. News & World Report.…

    • 742 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Developed in collaboration with healthcare and information security professionals, the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a security framework for protecting health information tailored for the U.S. healthcare industry. The CSF includes and integrates federal and state regulations, standards, and frameworks such as HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and COBIT (Control Objectives for Information and related Technology) to provide a healthcare organization with a broad and adaptable tool for assessing risk (Murphy, 2015). As described on the Health Information Trust…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cccc Core Competencies

    • 746 Words
    • 3 Pages

    I have provided recommendations regarding strategic projects, future goals and organisational objectives while supporting ongoing change and providing comprehensive analysis of current practice and the impact of new directions in multidisciplinary coordination and patient record management. Previous to my work with CCLHD I had the opportunity to work in Dubai, United Arab Emirates (UAE) integrating the secondary tier for the current UAE health service over a three year contract. I was employed as a Management Consultant with Dubai Health Care City (DHCC) to implement their new operating systems. This comprised teams creating workflow systems for individual components/sites within the Health Care City business model.…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Interdisciplinary Team

    • 76 Words
    • 1 Pages

    It is important when implementing a new health-IT system that an interdisciplinary team comprising of nurses, healthcare providers and other stakeholders be involved in the process of planning, providing resource management expertise, outlining a clear transition plan for the healthcare facility and to provide ongoing support throughout and during the implementation process. The following is a table reflecting the core members of the interdisciplinary team that will be used in the implementation of the health-IT system.…

    • 76 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Dr.Briggs and class, A policy is a purposeful plan of action or inaction developed to deal with a problem or a matter of concern in either the public or private sector. A policy includes the authoritative guidelines that direct human behavior toward a set of specific goals and provides the structure to direct action, including guidelines to impose sanctions that affect the conduct of affairs. Policies can be determined by the private or public sector that together can have a significant and long-lasting impact on communities and individuals. It is important to recognize that public policies are result of the politics and values of those determining the policy. governments create public by making decisions regarding a health issue such…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Please answer the question in 350 words or less. Why are you interested in attending the University of Virginia School of Medicine? What factors will be most important to you in choosing a medical school? University of Virginia’s reputation as a forerunner in medical education and research with values such as excellence and leadership make it an ideal match for an engaged, driven student like myself.…

    • 813 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Millions of Americans depend on the Department of Homeland Security to protect their information including addresses, phone numbers, and other online information that is stored on the DHS’s network. Although cyber attacks can happen at any time, the Department of Homeland Security has many agencies to stop these attacks. The National Cybersecurity and Communications Integration Center (NCCIC) is one of the many agencies that works to stop and address cyber attacks. It is a 24/7 cyber awareness management center. It addresses threats and other incidents affecting our cyber infrastructure to the public to warn citizens about keeping their information…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There have been numerous cyber-attacks in the medical world over the past several years that have compromised millions of people personal information. Hackers have been taking advantage of hospitals weak security encryption systems to access the public’s personal records and identity information. The purpose of these attacks are to basically attain people’s Social security numbers, credit card info, health insurance information and emails in order to sell them in the cyber black market. Cyber security within healthcare revolves around the laws and procedures that are already in effect within the healthcare system.…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays