SlideShare a Scribd company logo
1 of 15
Every Wednesday, as part of my second-year medical student
experience in Rockford, I travel north to see patients at the UIC
University Primary Care Clinic at Rockton. Early this past
winter,
I was handed the chart of a new patient and I was told I was
seeing
him for “stomachaches.” I closed the door to the sterile white
examination room to face a thin, pale young boy, fourteen years
old
and sitting on the exam table with his knees pulled to his chest.
His
head jumped as the exam door snapped briskly shut. I
introduced
myself and crouched at eye-level next to him. He tightened the
grip
on his knees. “What’s wrong?” Silence filled the bleach-tinged
air,
and his eyes stared at me, unblinking.
“He’s not eating anything, says his stomach hurts.” The voice
came from the mother in the corner of the room. I hadn’t even
noticed her as I entered, all my attention focused immediately
on the
tensed figure on the bed. “For the past two weeks, it’s been
nothing
but cereal, and only a handful of that.” I listened to the mother
sketch a history of nausea, stomachaches, and absent stares. It
gave
the impression of more than the typical stomachache, and I
plied
ahead, waiting to finally ask the key question that slipped the
knot
on this mystery and sent the bacteria or virus or swallowed
garden
flower culprit plummeting into my lap. The knot refused to
give.
“Where did he get the bruises?” I ventured, hoping to unearth
some bleeding disorder with a forgotten manifestation of
gastrointestinal symptoms. The mother looked at the scattered
marks
around the red-head’s temples through her friendly librarian
glasses,
then up at me.
“He’s very active, normally, and gets into all sorts of spots.
He comes in from the woods with new cuts and scrapes every
night.
You should have seen him after the big rains, all mud and torn
jeans.” With this she looked back at the alabaster boy huddling
on
the bed and smiled with the memory of his past spirit.
A professor teaching our physical diagnosis class told us we
should know 80 percent of the cases coming before us by
hearing the
•
descriptive
details set the
scene and focus
on the patient
• first-person point of view
•
dialogue
provides infor-
mation narrator
did not know
•
Narrator
introduces a
key conflict into
the plot
•
Mother uses
present and
past perfect
tenses to refer
to earlier
actions by her
son; narrator
uses past tense
to describe
mother’s
actions in the
exam room
Jeff Gremmels, “The Clinic”
history alone. This case was quickly proving itself the undesired
20 percent. I moved to the physical exam. The boy was not keen
on
the concept of my examining him, and made his desires very
clear as
he refused every request to look up at me or to open his
clamped
mouth. I wanted to solve this puzzle and began to insist more
forcefully until finally, with his surprisingly strong mother, I
managed to pull his loose shirt over his head. Beneath that shirt
lay
pale doughy skin, its spongy texture belying the taut
musculature
beneath. On the surface of the skin was a continuation of the
light
bruising around his temples. As the mother sat down and the
boy
resumed his curled-ball posture, my eyes picked out almost one-
dozen
small, red “U”s, with two small bars between the uprights like a
German umlaut. Raised and bright, more like a rash or burn than
a bruise, I hoped these would be the clues I needed to solve my
mystery of the afternoon. Further examination revealed nothing
more than a continuation of the pattern down to his ankles.
I combed my cloudy memories of past lectures for anything
reminiscent of this strange mark as I walked up the hall to find
a
doctor. The search failed to exhume any diseases with ties to
Germanic vowels.
As I explained my cryptic findings to the attending physician,
I saw her eyes quickly open, contradicting my belief that she
was
actually asleep. Pushing insurance papers towards me, she
quickly
stated, “I’m going to look at him. I want you to have the mother
fill
these out in the waiting room.” I followed her white lab coat to
the
exam room and completed my assigned mission. I returned from
the waiting room—despite the mother’s distant protests of
having
already completed the same forms—to find the attending
physician
on the phone and admitting my patient directly to hospital care.
Twenty-five minutes later, I again sat in her office, listening to
the diagnosis. “The wheels of a lighter, a disposable lighter,
leave
those two umlaut marks—nothing else looks like it. It’s almost
always abuse in his age group.” I couldn’t think of any reply,
and we
spent several minutes gazing into the carpet, silent and
introspective.
•
Events in
exam room
presented in
chronological
order
•
transitions
increase
suspense, then
lead to climax
of plot
I left the clinic alone and went directly to my apartment,
missing
the evening lecture on “Insulin and Diabetic Control.”
Four days later, I went to the hospital to see the boy who was
once my patient. I read the psychiatrist’s chart notes slowly,
rereading the passages describing the boy’s abuse by his
stepfather
and his three-year history of self-mutilation and depression. It
never
entered my mind, so avid for a solution, to ask for a history of
hospitalizations or illness, and I felt the cavernous shadows of
my
own missing knowledge hinting at their depth. My focus had
always
been on the disease, the physiologic atrocity accosting the
patient’s
unsuspecting organs and cells. This was my first glimpse into an
arena I had utterly neglected—the patient’s psyche—quietly
present
in everyone and in every disease.
Entering the boy’s room, I found him asleep, an IV pole
standing sentry over his frail visage. I picked up a crumpled
note
from the floor, smoothing it to reveal the young patient’s shaky
handwriting:
I wish I were a paper airplane,
Soaked in gas, shooting red flames,
burning with an orange glow, over
all the people below.
I could fall through the sky
like a comet or a meteorite.
I could become a UFO,
become someone I did not know.
Years of lectures, labs, and research could not match the
education I received in five days with this single boy.
•
More transi-
tions lead to
narrator’s final
understanding
of events
•
Narrator’s main
point in telling
the story
Jeff Gremmels, “The Clinic.” Reprinted by permission of the
author.
Computer Security Fundamentals
by Chuck Easttom
Chapter 10 Security Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Chapter 10 ObjectivesRecognize the importance of security
policiesUnderstand the various policies and the rationale for
themKnow what elements go into good policiesCreate policies
for network administrationEvaluate and improve existing
policies
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Explain what cyber terrorism is and how it has been used in
some actual cases.
Understand the basics of information warfare.
Have a working knowledge of some plausible cyber terrorism
scenarios.
Have an appreciation for the dangers posed by cyber terrorism.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Introduction Technology by itself cannot solve all network
security problems.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Cyber terrorism, according to the definition of the FBI:
Premeditated, politically motivated attack against information,
computer systems, computer programs, and data that results in
violence against noncombatant targets by subnational groups or
clandestine agents.
Typically, loss of life in a cyber attack would be less than in a
bombing attack.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Introduction (cont.)Virus software won't prevent a user from
manually opening an attachment and releasing a virus.A
technologically secured network is still vulnerable if former
employees (perhaps some unhappy with the company) still have
working passwords. Or if passwords are simply put on Post-it
notes on computer monitors.A server is not secure if it is in a
room that nearly everyone in the company has access to.Your
network is not secure if end users are vulnerable to social
engineering.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
All these could lead to significant deaths: train wrecks, hospital
deaths, loss of air traffic control resulting in plane crashes, and
so forth.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
What Is a Policy?A security policy is a document that defines
how an organization deals with some aspect of security. There
can be policies regarding end-user behavior, IT response to
incidents, or policies for specific issues and incidents.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
All these could lead to significant deaths: train wrecks, hospital
deaths, loss of air traffic control resulting in plane crashes, and
so forth.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Defining User PoliciesPasswordsInternet useE-mail
attachmentsInstalling/uninstalling softwareInstant
messagingDesktop configuration
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
All these could lead to significant deaths: train wrecks, hospital
deaths, loss of air traffic control resulting in plane crashes, and
so forth.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
System Admin PoliciesNew EmployeesDeparting
EmployeesChange ControlAccess Control
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
All these could lead to significant deaths: train wrecks, hospital
deaths, loss of air traffic control resulting in plane crashes, and
so forth.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Other IssuesBring Your Own DeviceA major concern in the
modern networkNew EmployeesDeparting Employees
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Bring your own device (BYOD) has become a significant issue
for most organizations. Most, if not all, of your employees will
have their own smart phones, tablets, smart watches, and Fitbits
that they will carry with them into the workplace. When they
connect to your wireless network, this introduces a host of new
security concerns. You have no idea what networks that device
previously connected to, what software was installed on them,
or what data might be exfiltrated by these personal devices.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Change ManagementRFCCABFollow-up
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Software Development PoliciesSecurity standardsTesting
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Incident Response PoliciesHandling virusesDealing with
breaches
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
All these could lead to significant deaths: train wrecks, hospital
deaths, loss of air traffic control resulting in plane crashes, and
so forth.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Data ClassificationPublicSecure
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
BCP and DRPDRPBCPBIA
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Fault ToleranceBackupsFull: All changesDifferential: All
changes since last full backupIncremental: All changes since
last backup of any typeRAID
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
Relevant Laws & RegulationsHIPAASarbanes-OxleyPCI
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*
SummaryIn this chapter, you learned the technology is not
enough to ensure a secure network. You must have clear and
specific policies detailing procedures on your network. Those
policies must cover employee computer resource use, new
employees, outgoing employees, access rights, how to respond
to an emergency, and even how secure code in applications and
websites is.User policies must cover all aspects of how the user
is expected to use company technology. In some cases, such as
instant messaging and web use, policies may be difficult to
enforce, but that does not change that they must still be in
place. If your user policies fail to cover a particular area of
technology use, then you will have difficulty taking any action
against any employee who performs that particular misuse.
© 2016 Pearson, Inc. Chapter 10 Computer Security
Policies
*

More Related Content

Similar to Every Wednesday, as part of my second-year medical student e.docx

Electronic portfolio
Electronic portfolioElectronic portfolio
Electronic portfolio
ktmarney
 

Similar to Every Wednesday, as part of my second-year medical student e.docx (7)

Presentation Stanford Medicine X— Transcribed Narration
Presentation Stanford Medicine X— Transcribed Narration Presentation Stanford Medicine X— Transcribed Narration
Presentation Stanford Medicine X— Transcribed Narration
 
Amazing solution for the herpes virus from your body
Amazing solution for the herpes virus from your bodyAmazing solution for the herpes virus from your body
Amazing solution for the herpes virus from your body
 
Penmanship Paper Printabl
Penmanship Paper PrintablPenmanship Paper Printabl
Penmanship Paper Printabl
 
Electronic portfolio
Electronic portfolioElectronic portfolio
Electronic portfolio
 
Responsive Marketing // Are you ready for 2016?
Responsive Marketing // Are you ready for 2016?Responsive Marketing // Are you ready for 2016?
Responsive Marketing // Are you ready for 2016?
 
Responsive Marketing: being more accessible, engaging, and purposeful
Responsive Marketing: being more accessible, engaging, and purposefulResponsive Marketing: being more accessible, engaging, and purposeful
Responsive Marketing: being more accessible, engaging, and purposeful
 
How Doctors Die.pdf
How Doctors Die.pdfHow Doctors Die.pdf
How Doctors Die.pdf
 

More from elbanglis

Explore the Issue PapersYou will choose a topic from the Complet.docx
Explore the Issue PapersYou will choose a topic from the Complet.docxExplore the Issue PapersYou will choose a topic from the Complet.docx
Explore the Issue PapersYou will choose a topic from the Complet.docx
elbanglis
 
Experiencing Intercultural CommunicationAn Introduction6th e.docx
Experiencing Intercultural CommunicationAn Introduction6th e.docxExperiencing Intercultural CommunicationAn Introduction6th e.docx
Experiencing Intercultural CommunicationAn Introduction6th e.docx
elbanglis
 
Experimental and Quasi-Experimental DesignsChapter 5.docx
Experimental and Quasi-Experimental DesignsChapter 5.docxExperimental and Quasi-Experimental DesignsChapter 5.docx
Experimental and Quasi-Experimental DesignsChapter 5.docx
elbanglis
 
Explain how building partner capacity is the greatest challenge in.docx
Explain how building partner capacity is the greatest challenge in.docxExplain how building partner capacity is the greatest challenge in.docx
Explain how building partner capacity is the greatest challenge in.docx
elbanglis
 
Experience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docxExperience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docx
elbanglis
 
Expansion and Isolationism in Eurasia How did approaches t.docx
Expansion and Isolationism in Eurasia How did approaches t.docxExpansion and Isolationism in Eurasia How did approaches t.docx
Expansion and Isolationism in Eurasia How did approaches t.docx
elbanglis
 
EXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docx
EXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docxEXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docx
EXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docx
elbanglis
 
Experiments with duckweed–moth systems suggest thatglobal wa.docx
Experiments with duckweed–moth systems suggest thatglobal wa.docxExperiments with duckweed–moth systems suggest thatglobal wa.docx
Experiments with duckweed–moth systems suggest thatglobal wa.docx
elbanglis
 
EXP4304.521F19 Motivation 1 EXP4304.521F19 Motivatio.docx
EXP4304.521F19 Motivation  1  EXP4304.521F19 Motivatio.docxEXP4304.521F19 Motivation  1  EXP4304.521F19 Motivatio.docx
EXP4304.521F19 Motivation 1 EXP4304.521F19 Motivatio.docx
elbanglis
 
EXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docx
EXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docxEXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docx
EXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docx
elbanglis
 
Exercise Package 2 Systems and its properties (Tip Alwa.docx
Exercise Package 2 Systems and its properties (Tip Alwa.docxExercise Package 2 Systems and its properties (Tip Alwa.docx
Exercise Package 2 Systems and its properties (Tip Alwa.docx
elbanglis
 
Exercises for Chapter 8 Exercises III Reflective ListeningRef.docx
Exercises for Chapter 8 Exercises III Reflective ListeningRef.docxExercises for Chapter 8 Exercises III Reflective ListeningRef.docx
Exercises for Chapter 8 Exercises III Reflective ListeningRef.docx
elbanglis
 
Exercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docx
Exercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docxExercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docx
Exercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docx
elbanglis
 
Exercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docx
Exercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docxExercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docx
Exercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docx
elbanglis
 
ExemplaryVery GoodProficientOpportunity for ImprovementU.docx
ExemplaryVery GoodProficientOpportunity for ImprovementU.docxExemplaryVery GoodProficientOpportunity for ImprovementU.docx
ExemplaryVery GoodProficientOpportunity for ImprovementU.docx
elbanglis
 
Exercise Question #1 Highlight your table in Excel. Copy the ta.docx
Exercise Question #1  Highlight your table in Excel. Copy the ta.docxExercise Question #1  Highlight your table in Excel. Copy the ta.docx
Exercise Question #1 Highlight your table in Excel. Copy the ta.docx
elbanglis
 
Executive SummaryXYZ Development, LLC has requested ASU Geotechn.docx
Executive SummaryXYZ Development, LLC has requested ASU Geotechn.docxExecutive SummaryXYZ Development, LLC has requested ASU Geotechn.docx
Executive SummaryXYZ Development, LLC has requested ASU Geotechn.docx
elbanglis
 
ExemplaryProficientProgressingEmergingElement (1) Respo.docx
ExemplaryProficientProgressingEmergingElement (1) Respo.docxExemplaryProficientProgressingEmergingElement (1) Respo.docx
ExemplaryProficientProgressingEmergingElement (1) Respo.docx
elbanglis
 

More from elbanglis (20)

Explore the Issue PapersYou will choose a topic from the Complet.docx
Explore the Issue PapersYou will choose a topic from the Complet.docxExplore the Issue PapersYou will choose a topic from the Complet.docx
Explore the Issue PapersYou will choose a topic from the Complet.docx
 
Experiencing Intercultural CommunicationAn Introduction6th e.docx
Experiencing Intercultural CommunicationAn Introduction6th e.docxExperiencing Intercultural CommunicationAn Introduction6th e.docx
Experiencing Intercultural CommunicationAn Introduction6th e.docx
 
Experimental and Quasi-Experimental DesignsChapter 5.docx
Experimental and Quasi-Experimental DesignsChapter 5.docxExperimental and Quasi-Experimental DesignsChapter 5.docx
Experimental and Quasi-Experimental DesignsChapter 5.docx
 
Explain the role of the community health nurse in partnership with.docx
Explain the role of the community health nurse in partnership with.docxExplain the role of the community health nurse in partnership with.docx
Explain the role of the community health nurse in partnership with.docx
 
Explain how building partner capacity is the greatest challenge in.docx
Explain how building partner capacity is the greatest challenge in.docxExplain how building partner capacity is the greatest challenge in.docx
Explain how building partner capacity is the greatest challenge in.docx
 
Experience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docxExperience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docx
 
Expansion and Isolationism in Eurasia How did approaches t.docx
Expansion and Isolationism in Eurasia How did approaches t.docxExpansion and Isolationism in Eurasia How did approaches t.docx
Expansion and Isolationism in Eurasia How did approaches t.docx
 
Experimental PsychologyWriting and PresentingPaper Secti.docx
Experimental PsychologyWriting and PresentingPaper Secti.docxExperimental PsychologyWriting and PresentingPaper Secti.docx
Experimental PsychologyWriting and PresentingPaper Secti.docx
 
EXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docx
EXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docxEXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docx
EXPEDIA VS. PRICELINE -- WHOSE MEDIA PLAN TO BOOK Optim.docx
 
Experiments with duckweed–moth systems suggest thatglobal wa.docx
Experiments with duckweed–moth systems suggest thatglobal wa.docxExperiments with duckweed–moth systems suggest thatglobal wa.docx
Experiments with duckweed–moth systems suggest thatglobal wa.docx
 
EXP4304.521F19 Motivation 1 EXP4304.521F19 Motivatio.docx
EXP4304.521F19 Motivation  1  EXP4304.521F19 Motivatio.docxEXP4304.521F19 Motivation  1  EXP4304.521F19 Motivatio.docx
EXP4304.521F19 Motivation 1 EXP4304.521F19 Motivatio.docx
 
EXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docx
EXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docxEXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docx
EXPERIMENT 1 OBSERVATION OF MITOSIS IN A PLANT CELLData Table.docx
 
Exercise Package 2 Systems and its properties (Tip Alwa.docx
Exercise Package 2 Systems and its properties (Tip Alwa.docxExercise Package 2 Systems and its properties (Tip Alwa.docx
Exercise Package 2 Systems and its properties (Tip Alwa.docx
 
Exercises for Chapter 8 Exercises III Reflective ListeningRef.docx
Exercises for Chapter 8 Exercises III Reflective ListeningRef.docxExercises for Chapter 8 Exercises III Reflective ListeningRef.docx
Exercises for Chapter 8 Exercises III Reflective ListeningRef.docx
 
Exercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docx
Exercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docxExercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docx
Exercise 9-08On July 1, 2019, Sheridan Company purchased new equ.docx
 
Exercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docx
Exercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docxExercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docx
Exercise 1 – Three-Phase, Variable-Frequency Induction-Motor D.docx
 
ExemplaryVery GoodProficientOpportunity for ImprovementU.docx
ExemplaryVery GoodProficientOpportunity for ImprovementU.docxExemplaryVery GoodProficientOpportunity for ImprovementU.docx
ExemplaryVery GoodProficientOpportunity for ImprovementU.docx
 
Exercise Question #1 Highlight your table in Excel. Copy the ta.docx
Exercise Question #1  Highlight your table in Excel. Copy the ta.docxExercise Question #1  Highlight your table in Excel. Copy the ta.docx
Exercise Question #1 Highlight your table in Excel. Copy the ta.docx
 
Executive SummaryXYZ Development, LLC has requested ASU Geotechn.docx
Executive SummaryXYZ Development, LLC has requested ASU Geotechn.docxExecutive SummaryXYZ Development, LLC has requested ASU Geotechn.docx
Executive SummaryXYZ Development, LLC has requested ASU Geotechn.docx
 
ExemplaryProficientProgressingEmergingElement (1) Respo.docx
ExemplaryProficientProgressingEmergingElement (1) Respo.docxExemplaryProficientProgressingEmergingElement (1) Respo.docx
ExemplaryProficientProgressingEmergingElement (1) Respo.docx
 

Recently uploaded

Recently uploaded (20)

e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 

Every Wednesday, as part of my second-year medical student e.docx

  • 1. Every Wednesday, as part of my second-year medical student experience in Rockford, I travel north to see patients at the UIC University Primary Care Clinic at Rockton. Early this past winter, I was handed the chart of a new patient and I was told I was seeing him for “stomachaches.” I closed the door to the sterile white examination room to face a thin, pale young boy, fourteen years old and sitting on the exam table with his knees pulled to his chest. His head jumped as the exam door snapped briskly shut. I introduced myself and crouched at eye-level next to him. He tightened the grip on his knees. “What’s wrong?” Silence filled the bleach-tinged air, and his eyes stared at me, unblinking. “He’s not eating anything, says his stomach hurts.” The voice came from the mother in the corner of the room. I hadn’t even noticed her as I entered, all my attention focused immediately on the tensed figure on the bed. “For the past two weeks, it’s been nothing but cereal, and only a handful of that.” I listened to the mother sketch a history of nausea, stomachaches, and absent stares. It gave the impression of more than the typical stomachache, and I plied ahead, waiting to finally ask the key question that slipped the knot
  • 2. on this mystery and sent the bacteria or virus or swallowed garden flower culprit plummeting into my lap. The knot refused to give. “Where did he get the bruises?” I ventured, hoping to unearth some bleeding disorder with a forgotten manifestation of gastrointestinal symptoms. The mother looked at the scattered marks around the red-head’s temples through her friendly librarian glasses, then up at me. “He’s very active, normally, and gets into all sorts of spots. He comes in from the woods with new cuts and scrapes every night. You should have seen him after the big rains, all mud and torn jeans.” With this she looked back at the alabaster boy huddling on the bed and smiled with the memory of his past spirit. A professor teaching our physical diagnosis class told us we should know 80 percent of the cases coming before us by hearing the • descriptive details set the scene and focus on the patient • first-person point of view • dialogue provides infor-
  • 3. mation narrator did not know • Narrator introduces a key conflict into the plot • Mother uses present and past perfect tenses to refer to earlier actions by her son; narrator uses past tense to describe mother’s actions in the exam room Jeff Gremmels, “The Clinic” history alone. This case was quickly proving itself the undesired 20 percent. I moved to the physical exam. The boy was not keen on the concept of my examining him, and made his desires very clear as he refused every request to look up at me or to open his clamped mouth. I wanted to solve this puzzle and began to insist more
  • 4. forcefully until finally, with his surprisingly strong mother, I managed to pull his loose shirt over his head. Beneath that shirt lay pale doughy skin, its spongy texture belying the taut musculature beneath. On the surface of the skin was a continuation of the light bruising around his temples. As the mother sat down and the boy resumed his curled-ball posture, my eyes picked out almost one- dozen small, red “U”s, with two small bars between the uprights like a German umlaut. Raised and bright, more like a rash or burn than a bruise, I hoped these would be the clues I needed to solve my mystery of the afternoon. Further examination revealed nothing more than a continuation of the pattern down to his ankles. I combed my cloudy memories of past lectures for anything reminiscent of this strange mark as I walked up the hall to find a doctor. The search failed to exhume any diseases with ties to Germanic vowels. As I explained my cryptic findings to the attending physician, I saw her eyes quickly open, contradicting my belief that she was actually asleep. Pushing insurance papers towards me, she quickly stated, “I’m going to look at him. I want you to have the mother fill these out in the waiting room.” I followed her white lab coat to the exam room and completed my assigned mission. I returned from the waiting room—despite the mother’s distant protests of having already completed the same forms—to find the attending
  • 5. physician on the phone and admitting my patient directly to hospital care. Twenty-five minutes later, I again sat in her office, listening to the diagnosis. “The wheels of a lighter, a disposable lighter, leave those two umlaut marks—nothing else looks like it. It’s almost always abuse in his age group.” I couldn’t think of any reply, and we spent several minutes gazing into the carpet, silent and introspective. • Events in exam room presented in chronological order • transitions increase suspense, then lead to climax of plot I left the clinic alone and went directly to my apartment, missing the evening lecture on “Insulin and Diabetic Control.” Four days later, I went to the hospital to see the boy who was once my patient. I read the psychiatrist’s chart notes slowly, rereading the passages describing the boy’s abuse by his
  • 6. stepfather and his three-year history of self-mutilation and depression. It never entered my mind, so avid for a solution, to ask for a history of hospitalizations or illness, and I felt the cavernous shadows of my own missing knowledge hinting at their depth. My focus had always been on the disease, the physiologic atrocity accosting the patient’s unsuspecting organs and cells. This was my first glimpse into an arena I had utterly neglected—the patient’s psyche—quietly present in everyone and in every disease. Entering the boy’s room, I found him asleep, an IV pole standing sentry over his frail visage. I picked up a crumpled note from the floor, smoothing it to reveal the young patient’s shaky handwriting: I wish I were a paper airplane, Soaked in gas, shooting red flames, burning with an orange glow, over all the people below. I could fall through the sky like a comet or a meteorite. I could become a UFO, become someone I did not know. Years of lectures, labs, and research could not match the education I received in five days with this single boy. • More transi-
  • 7. tions lead to narrator’s final understanding of events • Narrator’s main point in telling the story Jeff Gremmels, “The Clinic.” Reprinted by permission of the author. Computer Security Fundamentals by Chuck Easttom Chapter 10 Security Policies * © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Chapter 10 ObjectivesRecognize the importance of security policiesUnderstand the various policies and the rationale for themKnow what elements go into good policiesCreate policies for network administrationEvaluate and improve existing
  • 8. policies © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Explain what cyber terrorism is and how it has been used in some actual cases. Understand the basics of information warfare. Have a working knowledge of some plausible cyber terrorism scenarios. Have an appreciation for the dangers posed by cyber terrorism. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Introduction Technology by itself cannot solve all network security problems. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Cyber terrorism, according to the definition of the FBI: Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents. Typically, loss of life in a cyber attack would be less than in a bombing attack. © 2016 Pearson, Inc. Chapter 10 Computer Security
  • 9. Policies * Introduction (cont.)Virus software won't prevent a user from manually opening an attachment and releasing a virus.A technologically secured network is still vulnerable if former employees (perhaps some unhappy with the company) still have working passwords. Or if passwords are simply put on Post-it notes on computer monitors.A server is not secure if it is in a room that nearly everyone in the company has access to.Your network is not secure if end users are vulnerable to social engineering. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * What Is a Policy?A security policy is a document that defines how an organization deals with some aspect of security. There can be policies regarding end-user behavior, IT response to incidents, or policies for specific issues and incidents. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and
  • 10. so forth. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Defining User PoliciesPasswordsInternet useE-mail attachmentsInstalling/uninstalling softwareInstant messagingDesktop configuration © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * System Admin PoliciesNew EmployeesDeparting EmployeesChange ControlAccess Control © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.
  • 11. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Other IssuesBring Your Own DeviceA major concern in the modern networkNew EmployeesDeparting Employees © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Bring your own device (BYOD) has become a significant issue for most organizations. Most, if not all, of your employees will have their own smart phones, tablets, smart watches, and Fitbits that they will carry with them into the workplace. When they connect to your wireless network, this introduces a host of new security concerns. You have no idea what networks that device previously connected to, what software was installed on them, or what data might be exfiltrated by these personal devices. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Change ManagementRFCCABFollow-up © 2016 Pearson, Inc. Chapter 10 Computer Security Policies *
  • 12. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Software Development PoliciesSecurity standardsTesting © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Incident Response PoliciesHandling virusesDealing with breaches © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Data ClassificationPublicSecure
  • 13. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * BCP and DRPDRPBCPBIA © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Fault ToleranceBackupsFull: All changesDifferential: All changes since last full backupIncremental: All changes since last backup of any typeRAID © 2016 Pearson, Inc. Chapter 10 Computer Security Policies *
  • 14. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * Relevant Laws & RegulationsHIPAASarbanes-OxleyPCI © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * © 2016 Pearson, Inc. Chapter 10 Computer Security Policies * SummaryIn this chapter, you learned the technology is not enough to ensure a secure network. You must have clear and specific policies detailing procedures on your network. Those policies must cover employee computer resource use, new employees, outgoing employees, access rights, how to respond to an emergency, and even how secure code in applications and websites is.User policies must cover all aspects of how the user is expected to use company technology. In some cases, such as instant messaging and web use, policies may be difficult to enforce, but that does not change that they must still be in place. If your user policies fail to cover a particular area of technology use, then you will have difficulty taking any action against any employee who performs that particular misuse. © 2016 Pearson, Inc. Chapter 10 Computer Security Policies
  • 15. *