Computer Science

Chapter 6 covers Security and Privacy of Health Information, specifically HIPAA laws. Why would hackers be interested in stealing medical information? Is blackmail a motive? How would a hacker monetize medical records they’ve stolen?

Answer the question with a short paragraph, between 150 and 250 words. Brevity is a virtue. That is why you are limited to 250 words. If you can’t present your hypothesis in 250 words or less then it is too complicated.


Health insurance credentials are especially valuable in today’s economy because health care costs are causing people to seek free medical care with these credentials. The importance of Health information for health IT is to provide a better quality service to the patient depending on his/her health history. This History of medical is very important sometimes the loss of history may lead to danger for the patient because if no proper history found there may be wrong medication to patients by medical experts. The hackers are interested in stealing medical information because after stealing it might be sold to the health insurance companies for tracking or do some illegal activity etc.

After stealing the medical information from the highly secured servers they may blackmail the patient after going through the medical history of the patient or maybe a motive to do damage if any vengeance(Armstrong, et, al, 2005).

Sometimes, hackers want to steal your data so that they can hold it for ransom. This type of attack is a ransomware attack. Hackers usually execute ransomware attacks by gaining unauthorized access to data, then encrypting it or moving it and charging a ransom in order to restore your access to it. On the black market, the going rate for your social security number is 10 cents. Your credit card number is worth 25 cents. But your electronic medical health record(EHR) could be worth hundreds or even thousands of dollars.

Hackers have devised numerous ways to steal important data which is then put to misuse. Phishing is a fake email masquerading as legitimate. Hackers create phishing emails through which they intend to steal your confidential information like passwords and bank account details.(Wilson, 2006).

Discussion 6 reply and Discussion 9

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Benefits of our college essay writing service

  • 80+ disciplines

    Buy an essay in any subject you find difficult—we’ll have a specialist in it ready

  • 4-hour deadlines

    Ask for help with your most urgent short tasks—we can complete them in 4 hours!

  • Free revision

    Get your paper revised for free if it doesn’t meet your instructions.

  • 24/7 support

    Contact us anytime if you need help with your essay

  • Custom formatting

    APA, MLA, Chicago—we can use any formatting style you need.

  • Plagiarism check

    Get a paper that’s fully original and checked for plagiarism

What the numbers say?

  • 527
    writers active
  • 9.5 out of 10
    current average quality score
  • 98.40%
    of orders delivered on time