Glycemic Control Monitoring

In: Science

Submitted By psullivan1878
Words 646
Pages 3
Patrick Sullivan

HSCI 331

Journal Critique

The Potential for Glycemic Control Monitoring and Screening for diabetes at Dental Visits Using Oral Blood:

By: Shiela M. Strauss, Mary T. Rosedale, Michael A. Pesce, David M. Rindskopf, Navjot Kaur, Caroline M. Juterbock, Mark S. Wolff, Dolores Malaspina, and Ann Danoff

Vol. 105, No. 4, pp. 796-801.

doi: 10.2105/AJPH.2014.302357

Diabetes has become a major problem in the United States. More and more Americans are affected each day because simple healthy lifestyle routines are not met. There are many undiagnosed Americans who do not know that they have or are susceptible to diabetes due to family history of the disease or their very own dietary disorientation. Glycemic control, a way to monitor blood sugar through diet and blood source, has proven to help people with diabetes and those who are pre-diabetic. The major public health issue which this research concerns is how to get early diagnosis and treatment through a more primary intervention for those who already have or are susceptible to diabetes. The study is important because Type 2 diabetes and other forms of the disease are preventable. Patients can only be helped if they are diagnosed, understand susceptibility, and are aware of the health problem. There is a known fact that most patients visit their dental provider more often than a primary care provider (PCP), some reasons being that dental visits are inexpensive and less invasive. The objective of this study is to examine the ability and potential for glycemic control monitoring in screening for diabetes through dental care providers during normal dental examinations.

Furthermore, during routine dental cleans, oral blood can be easily collected in a less invasive and more comfortable setting for a patient who needs to be screened for diabetes. The methods introduced to the…...

Similar Documents

Testing and Monitoring Security Controls

...NT2580 Unit 5 Testing and Monitoring Security Controls A few different types of security events and baseline anomalies that might indicate suspicious activity Different traffic patterns or influx in bandwidth usage can be considered suspicous activity. Or sevices changing port usage, in turn creating variaitons in normal patterns. A sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. A sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner to track them. Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should be already be watching the event logs of your servers for failed logons and other security-related events. Log Files contain complete records of all security events (logon events, resource access, attempted violations of policy, changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow a admin to quickly discover the root cause of......

Words: 573 - Pages: 3

Testing and Monitoring Security Controls Worksheet

...first place to check for administrative issues and security activity. Log files help you put together a timeline of events surrounding everything from a performance problem to a security incident. You can also identify bad system or network activities by observing anomalies from baseline behavior or identifying certain suspicious actions. Testing ensures that your control and monitoring facilities work as intended and maintain proper operation. Monitoring ensures that you capture evidence when your testing procedures fail to examine all possibilities or legitimate behavior permits unauthorized activity. Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Always consider that even legitimate traffic can be used in illegitimate ways, and sometimes, legitimate traffic can appear illegitimate. Protected services can be attacked from the inside or accessed externally through loopholes in firewall rules. Vulnerabilities may remain unidentified by intrusion detection system (IDS) or intrusion prevention system (IPS) signatures and evade detection. Monitoring helps you capture pieces of the puzzle that creates a timeline of events. Think on the following lines to answer this assignment: * How do you obtain a baseline of system or network behavior? * What is an anomaly in relation to baseline behavior? * Why might certain anomalies be worth investigating? * How can traffic have patterns that......

Words: 477 - Pages: 2

Nt2580 - Testing and Monitoring Security Controls

...Different traffic patterns can be a red flag when it comes to identifying different types of suspicious activities. There are multiple ways traffic can change to point out the activities: First is a sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. Another would be a sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner like Observer or Network Monitor to track them. Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should already be watching the event logs of your servers for failed logons and other security-related events. Log Files contain complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an admin to quickly discover the root cause of any issues. When remote users do not have recent patches or updates The system admin should......

Words: 375 - Pages: 2

Nt2580 - Unit 5.Ass1 - Testing and Monitoring Security Controls

...activity. Authentication failures and unauthorized access attempts can be found in the log files. They contain complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an admin to quickly discover the root cause of any issues. A sudden increase in traffic can indicate that either your web site has been mentioned on a popular news site and people are checking it out, or it may mean that someone is up to no good. Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risks and minimize exposure. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem. Solution: Limiting the privileges of users adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. Passwords that meet security requirements but remain easily guessable are a hazard and could affect a network. Solution: Implementing a change of password every so often. Implement the strategy that requires a combination of letters and numbers, and a minimum of a 30 day password renewal......

Words: 301 - Pages: 2

Glycemic Control

...Abstract Complications from, and economic costs associated with diabetes are on the rise. The concern is that this global health epidemic is only expected to worsen in the coming decades. One quantitative research study aims to improve patient outcomes specifically related to proper control of blood glucose level, by linking patient outcomes with health literacy and patient trust. A quantitative study consisting of a convenience sample of 102 subjects from two urban health care centers was used. Patient demographics, socioeconomic status, and diabetes related knowledge, and depression were measured. The results of this study are mixed in supporting the hypothesis that lower health literacy directly impacts glycemic control. The 2010 journal article titled, “Impact of health literacy and patient trust on glycemic control in urban USA population” from Nursing Health and Sciences, hypothesizes a direct relationship between a patient’s overall health literacy and the ability to maintain glycemic control. The study’s intent is to examine questions related to health literacy and a patient’s trust in their healthcare provider to make a connection to how well the subjects managed glycemic control. Questions related to potential depression are also relevant. Author, Josephine M. Mancuso, PhD, ANP-BC from Marquette University, has published articles in the following nursing journals: Journal Of Nursing Care Quality, Journal Of Professional Nursing: Official Journal Of The......

Words: 1709 - Pages: 7

Testing and Monitoring Security Controls & Security Audits and Assessments

...Testing and Monitoring Security Controls & Security Audits and Assessments Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. * Authentication failures are one type of security event. A baseline anomalie that may indicate suspicious activity are unauthorized access attempts that can be found within log files. The log files contain records of all types of security events such as logon events, changes in system configuration and attempted violations of policy as well as system events like service startups and closures, errors and system warnings. * A second security event could be a sudden increase in overall traffic. It could simply mean that your website has been mentioned by a popular source, or it could mean that someone is trying to cause harm to your site. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. * Problem: Removable storage drives introduce malware filtered only when crossing the network. Solution: Limit user privileges that only include those that are required by the duties that are assigned to that individual. This will hopefully make it clear that no removable storage devices are to be connected to the network, no matter the circumstances unless they are screened first. * Problem:......

Words: 316 - Pages: 2

Testing and Monitoring Security Controls

...Testing and Monitoring Security Controls In the grand scheme of things security controls, in a nutshell, are in place to prevent security breaches. Security controls are safeguards or countermeasures to avoid, counteract or minimize security risks relating to personal property, or computer software. So anything that has to do with accessing sensitive information with the intent of using it maliciously is considered a security risk. Things that might be overlooked or investigated may be cause for concern as there are never any true false positives in the world of cyber security. A couple of things that usually go unnoticed are failed login attempts and increased network traffic. This is what can be done to prevent this issue. You are coming back from a much needed vacation and you attempt to log on to your computer. Using the same password that you have established for all of your accounts for this company yet you have a message stating that your password is incorrect. You then notice your caps lock is on, try the password again and all is right with the world. The IT department calls and asks did you have an issue logging in and they ask for details, you mention the caps lock key and they chalk it up as user error. The logon attempts log that was in place at your place of employment allows the security team to pickup when something is wrong. Now take that same situation but instead of caps lock being the reason, you cannot access it at all. You learn from the IT security...

Words: 755 - Pages: 4

Unit 5 Assignment 1 Testing and Monitoring Security Controls

...Testing and Monitoring Security Controls Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. A sudden increase in traffic can indicate that either your web site has grown in popularity. It can also indicate that there have been attempts at unauthorized access to your network. Authentication failures and unauthorized access attempts can be found in the log files. They contain the complete records of all security events as well as critical system events that allow an admin to quickly discover the root cause of any issues. Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risks and minimize exposure. Passwords that meet security requirements but remain easily guessable are a hazard and could affect a network. * Solution: Implementing a change of password every so often. Implement the strategy that requires a combination of letters and numbers, and a minimum of a 30 day password renewal policy. Information on a laptop that is not encrypted poses a huge security issue. It would be likely that there would be some sort of damage in the event of falling into the wrong hands. * Solution: To prevent this from happening it is important to encrypt the drives and other sensitive information. Removable storage devices could contain malware, filtered only when passing through the network could be a...

Words: 277 - Pages: 2

Unit 5 Assignment 1 Testing and Monitoring Security Controls

...NT2580 Unit 5 Assignment 1 Testing and Monitoring Security Controls Jose J Delgado Testing and Monitoring Security Controls A few different types of security events and baseline anomalies that might indicate suspicious activity. Different traffic patterns or influx in bandwidth usage can be considered suspicious activity. Also, services changing port usage, in turn creating variations in normal patterns. All sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. A sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner to track them. Some routers collect packet-level statistics; you can also use a software network scanner to track them. Also large numbers of packets caught by your router or firewall's egress filters. Egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because it is a clear sign that devices on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events. Log Files encompass complete records of all security events (logon events, resource access, attempted violations of policy, and......

Words: 524 - Pages: 3

Unit 5 Assignment 1: Testing and Monitoring Security Controls

...Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. 1. A sudden increase in traffic can indicate that either your web site has grown in popularity. It can also indicate that there have been attempts at unauthorized access to your network. 2. Authentication failures and unauthorized access attempts can be found in the log files. They contain the complete records of all security events as well as critical system events that allow an admin to quickly discover the root cause of any issues. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. 1. Passwords that meet security requirements but remain easily guessable are a hazard and could affect a network. * Solution: Implementing a change of password every so often. Implement the strategy that requires a combination of letters and numbers, and a minimum of a 30 day password renewal policy. 2. Information on a laptop that is not encrypted poses a huge security issue. It would be likely that there would be some sort of damage in the event of falling into the wrong hands. * Solution: To prevent this from happening it is important to encrypt the drives and other sensitive information. 3. Removable storage devices could contain malware, filtered only when......

Words: 283 - Pages: 2

Testing and Monitoring Security Controls

...Network Behavior Anomaly Detection (NBAD) is a safety technique used in monitoring network for signs of bizarre activity. This program is enacted by establishing a baseline, overseeing at in situations of normal network and user behavioral characteristics. Using Network behavior anomaly detection you can obtain a baseline of system or network behavior? If an attacker is using a spoofed source address, legitimate traffic from that address will be blocked as well. A common way to gain control over a remote system is by installing a small application on a target machine. A Trojan horse is an application that is hidden in some other type of content, such as a legitimate program. It can be used to create a new, secret account called a back door, or it can be used to run spyware, which collects user keystrokes for analysis. Trojan horses can also be used to infect and control affected systems, destroy and expose valuable company information, or use your systems as launching pads for further attacks from the inside. Investigation is vital as it aids in triggering quick detection of viruses and worms that replicate on the server system, cause unscheduled reboots of the system and great data losses. If you have antivirus software installed on that server, the virus can turn off that antivirus software and firewall which was configured by antivirus. And that means your computer is not protected. Log Files contain complete records of all security events (logon events, resource access,......

Words: 618 - Pages: 3

Nt 2580 Unit 5 Assignment 1 Testing and Monitoring Security Controls

...Authentication failures and unauthorized access attempts can be found in the log files. They contain complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an admin to quickly discover the root cause of any issues. A sudden increase in traffic can indicate that either your web site has been mentioned on a popular news site and people are checking it out, or it may mean that someone is up to no good. Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risks and minimize exposure. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem. Limiting the privileges of users adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. Passwords that meet security requirements but remain easily guessable are a hazard and could affect a network. Implementing a change of password every so often. Implement the strategy that requires a combination of letters and numbers, and a minimum of a 30 day password renewal policy. Information on a laptop that is not encrypted......

Words: 282 - Pages: 2

High Glycemic Foods: Affects on Obesity & Disease

...High Glycemic Foods: Affects on Obesity & Disease Are high glycemic diets a cause of obesity and disease in America today? Obesity and chronic diseases such as diabetes and cardiovascular disease are at an all time high in the United States; studies link a high glycemic diet with obesity and chronic disease. The Worldwide Health Organization (WHO) reports that there are more than 1 billion overweight adults globally” (WHO, 2010). According to a 2005-2006 CDC study of the United States population, 34% of adults are obese. In addition, the International Diabetes Federation announced in 2006 that diabetes is becoming the epidemic of the 21st century with 246 million people affected worldwide (Lefebvre, 2006). Diabetes currently affects 23.5 million adults and 2 million adolescents in the United States with 1.6 million new cases diagnosed each year (American Diabetes Association, 2007). The WHO also reports that heart disease is the top cause of death in the world and in high-income countries like the United States (WHO, 2004). In 2006 the American Heart Association estimated that 81,100,000 million people in the United States have some form of Heart Disease (American Heart Association, 2006). Despite the fact that high glycemic foods do not affect all people the same way, high glycemic diets are killing Americans because they increase the risk of obesity and disease. High glycemic diets are prevalent in America today. Due to the rise of coronary heart disease in the......

Words: 4183 - Pages: 17

Testing and Monitoring Security Controls

...Log files would be the first place one would look to check for suspicious activity in the event of a crime. They can help you understand where something went wrong. Creating a timeline, of before and after the performance problem or incident. The way traffic moves through a network, especially when the computers are only used for certain things, creates baseline behavior. When something is out of place, such anomalies seem suspicious; but legitimate traffic could be used in illegitimate ways and legitimate traffic can at times seem illegitimate. By consistently monitoring the network, and observing all the possibilities, the anomalies of legitimate traffic wont seem that abnormal and one can focus on the real problems. Predictable passwords that meet minimum length requirements but remain easily guessable is a hazard that could affect a network with a weak password. If that is a problem, one should probably change the password every so often. It would be in everyone’s best interest if the password security level was increased, and that they would expire after a certain amount of time. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem. but by limiting the privileges of users, adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. If an unencrypted laptop......

Words: 313 - Pages: 2

Glycemic Index for Sweetners

...Glycemic Index for Sweeteners The glycemic index for sweeteners is a function of three things: 1. The amount of carbohydrate present.  2. The type of carbohydrate present.  3. The presence of other substances (soluble fiber for example) that slow metabolism of carbohydrates.  Glucose has a glycemic index (GI) of 100 and fructose is 25. Sucrose (Ordinary sugar) which is made up of a combination of these two has a GI of 65. The search for a low GI natural sugar based sweetener is somewhat futile as they all contain combinations of the above, or similar sugars. Although fructose has a fairly low GI , it has other harmful effects and must be considered unsafe to take in large quantities. Agave Syrup has a low GI because it is mainly fructose. Agave has been delisted and banned by theGlycemic Research Institute of Washington DC because serious side effects were observed in clinical trials. Coconut Palm Sugar contains mainly sucrose and one would expect a GI of about 65. However it scores well in the glycemic index for sweeteners list. Tests have indicated a GI of only about 35. This may be partly because of other substances in it such as soluble fiber. However, the testing was very limited. More testing may well produce a higher GI. Yacon Syrup, scores best in the Glycemic Index for Sweeteners that are sugar based. It derives it's sweetness from Fructo-oligosaccharides, a type of sugar with a very low GI. It is probably the only truly raw, organic, natural, low calorie,......

Words: 6014 - Pages: 25