Essay on Computer and Medical Information Systems

Submitted By jetster98
Words: 1463
Pages: 6

External Sources
Deliberate Damage- Deliberate Damage to external sources is a type of damage that you intended to do to the external source for example Hackers- computer users attempt to access data files and records using communication networks to plant viruses, divert electronic financial transactions for personal gain.
Accidental Damage- Accidental Damage to external sources is a type of damage that is done mistakenly done to the external source for example Electrical power surges and spikes- changes in an electrical power can cause damage to computer hardware, software and stored data files. Internal sources
Deliberate Damage- Deliberate Damage to internal sources is a type of damage you intended to do to the internal source for example you want to delete a file from your computer, you will delete it from the system.
Accidental Damage- Damage done to the internal source accidentally for example you wanted to delete a file, but mistakenly you deleted another file instead of the one you wanted to delete.
A computer virus is a program that infects computer files and makes them do something unexpected or damaging.
There are 3 main types of viruses. Those are those that infect program files. When a virus infects a program file, when the program is loaded the virus is loaded as well. Those that inect system or boot files. When a virus infects the boot file the virus is loaded in the memory and is able to run whenever the computer is on. Macro Viruses. The virus is carried by a document and is executed when the document is opened; over half of the known viruses are macro viruses spread by e-mail attachments.
A worm is another electronic threat. Unlike virus, it does not require a host program in order be transmitted.
The best way to protect a computer against viruses is to install anti-virus software.
Anti-virus software protects the operating system, programs and files against viruses Some anti-virus software are Norton Antivirus, McAfee and much more.
A database contains the raw data for information.
Backing up files is always important. Imagine if doctor’s never backed up their patients files, and their computer gets a virus and all files are lost, The patients and the doctor will be in a big problem. So therefore backing up your files is very important.

The data and software developed and used exclusively by the organization is known as proprietary data and must often be used by employees for day to day operations. Computer Fraud
Computer Fraud is when a person frauds someone through the internet for example. A person creates a fake website such as a company website that does not exist, then other people who visit the website will put in their credit card payments and then the frauds will accept their payments and spend it somewhere else. Unauthorized access
Unauthorized access is usually referred as ‘hacking’ or ‘cracking’. Hacking involves trying to electronically break into a system to which the individual does not have authorized access. Most people hack because of games, but some people hack organizations to change their critical data. Electronic eavesdropping
This is the use of electronic devices to monitor electronic communications between two or more groups without the permission of any communication parties. This includes data communication, voice, fax, land, and cellular telephone and e-mail. Surveillance
\Computer surveillance involves the use of technology to gather information in some organization. Limited measures to prevent computer surveillance. Monitoring software and hardware devices are a technique for surveillance. Copyright and privacy
Copyright is the name given to the protection in law of the rights of the person(s) responsible for creating such things as a piece of music, a computer program etc. You shouldn’t copyright someone’s stuff because it is not fair to them and it is illegal. It is a criminal offence to be caught copying or stealing software.…