chapter9

Electronic Security

Lisa Reeves Bertin, Dee McGonigle, and Kathleen Mastrian

OBJECTIVES

1. Assess processes for securing electronic information in a computer network.

2. Identify various methods of user authentication and relate authentication to security of a network.

3. Explain methods to anticipate and prevent typical threats to network security.

Get Informatics for Health Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.