Look over the materials in this lesson(note: Medical billing/coding or Healthcare), and think about how data is collected, stored, and shared. Now, think about all the ways that a hacker might gain access to that information. Identify at least three ways (and more if you can) a hacker might gain access to information. Enter them into a Word document, save the file with the name ComputerSecurity
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. Use the Turnitin Originality Report available in Taskstream as a guide for this measure of originality.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Summarize how the principles of beneficence, non-maleficence, autonomy, and justice apply to the scenario by doing the following:
1. Describe how you would respond to Mr. Newcombs request.
2. Evaluate how you applied the principles of beneficence, non-maleficence, autonomy, and justice to the scenario.
3. Examine how personal beliefs and values influenced your response to the scenario.
4. Describe three strategies to promote self-care.
B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
C. Demonstrate professional communication in the content and presentation of your submission.