You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?
The requirement in this scenario to trace changes made to patient records back to the person who made them is an example of non-repudiation which refers to the ability to prove that a particular action was performed by a specific entity or user and cannot be denied, i.e., there is "non-repudiation" of their action.
Availability (A) mainly relates to ensuring that information or resources are available whenever needed, while Confidentiality (B) primarily addresses how sensitive data should be kept in secrecy from unauthorized access.
Data protection (D) is a more general term that may cover all three principles(Availability, Confidentiality and Integrity etc.) and typically includes multiple measures like backups,network security controls,data encryption strategies among others-aimed at protecting different dimensions of system-level operations."
The variant "D. Data Protection" is incorrect because data protection is a broad term that can cover various aspects of information security such as confidentiality, integrity, availability, and non-repudiation. However, while patient record changes should be protected by security measures that maintain confidentiality and protect against unauthorized access or modification (as expected in D.Data Protection), the specific requirement to track every change made poses a non-repudiation challenge.
Non-repudiation ensures accountability for actions taken on sensitive systems by holding users responsible for their activities even if they later deny them. This capability helps to ensure responsible behavior within organizations concerning critical systems such as those handling patient records where reliability and system logs availability play important roles.
Therefore Non-Repudiation is more central in this context than overall data protection principles alone since it involves being able to trace back who did what to medical records rather than just securing it from external threats or vulnerabilities.
upvoted 1 times
...
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
74gjd_37
5 months, 2 weeks ago74gjd_37
5 months, 2 weeks ago74gjd_37
5 months, 2 weeks ago