chapter9
Electronic Security
Lisa Reeves Bertin, Dee McGonigle, and Kathleen Mastrian
OBJECTIVES
1. Assess processes for securing electronic information in a computer network.
2. Identify various methods of user authentication and relate authentication to security of a network.
3. Explain methods to anticipate and prevent typical threats to network security.
Key Terms
Get Informatics for Health Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.