Chapter 10 - Data Security Flashcards

1
Q

three basic types of backup

A
  1. full backup - It is a full copy of your entire data set.
  2. incremental backup - a backup of the data that has changed since the most recent backup (regardless of if its incremental or full). This is the fastest backup.
  3. differential backup - a backup of everything that changes since the last full backup; it accumulates as more and more differential backups are done. This is slower than incremental backups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

five threats to health information

A
  1. internal employees who make unintentional errors
  2. internal employees who abuse their access to information
  3. internal employees who access the system for spite or profit
  4. hostile outsiders who attempt to access information or steal resources
  5. angry internal employees or hostile outsiders who attack the information system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

spite

A

(1) petty ill will or hatred with the disposition to irritate, annoy, or thwart
(2) the phrase “in spite of” = in defiance or contempt of, without being prevented by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tailgating

A

A social engineering technique that allows a hacker, imposter, or other unauthorized individual to use an authorized individual’s access privileges to gain access to a restricted physical area.
For example, an imposter, hacker, or other unauthorized individual wants to gain access to a building that requires badge access. This unauthorized individual follows closely behind an individual who just swiped his or her badge and gains access by simply following the other individual inside the building. It is human nature for a person to hold a door open for someone behind him or her and not let the door close on that person. The unauthorized person knows this and exploits the good nature of another individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

administrative safeguards

A

documented, formal practices to manage data security measures throughout the CE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

spear phishing

A

Similar to phishing but requires a little more work on the part of the hacker. When the hacker engages in spear phishing, the hacker researches the individual whose identity the hacker will assume by looking up social media accounts and researching the individual’s activity on the web. The hacker will typically assume the identity of an individual in a high-level leadership position of an organization. While assuming this online identity, the hacker will then target other individuals within the ­organization to try to obtain personal ­information from them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tornado vs hurricane

A

Hurricanes and tornadoes are alike in basic ways. Both produce powerful, swirling winds — and both can leave a path of death and destruction.
While tornadoes originate on land, hurricanes are formed on large water bodies. The wind speed in tornadoes is significantly faster than the wind speed of the hurricane. However, while tornadoes usually last for minutes, a hurricane, once formed, can last for days, even weeks at times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

rootkit

A

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA Triad

A

These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. They are a standard used by information security professionals.

  1. Confidentiality: Only authorized and appropriate individuals access the data within an information system.
  2. Integrity: The data within the system can be trusted. This was discussed at the beginning of the chapter.
  3. Availability: The data within the system is available to the end user wherever and whenever it is needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

likelihood determination

A

an estimate of the probability of threats occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

impact analysis

A

an estimate of the impact of threats on information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

single sign-on

A

an authorization strategy that allows a user to log in to many separate, although related, information systems. Single sign-on allows a user to log in one time and be able to access many information systems. This prevents the user from having to log in to each information system individually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

smart card

A

a physical card that has an embedded integrated chip that acts as a security token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

automatic logouts

A

timed logouts that reduce the chances that one’s account will be used by someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

information technology asset disposition (ITAD)

A

the process of disposing of unwanted electronic equipment in a responsible manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

viable

A

(1) capable of living
(2) of a fetus: having attained such form and development of organs as to be normally capable of surviving outside the uterus
(3) capable of growing or developing
(4) capable of working, functioning, or developing adequately
(5) capable of existence and development as an independent unit
(6) having a reasonable chance of succeeding
(7) financially sustainable

17
Q

application safeguards

A

controls contained in application software or ­information systems to protect the security and integrity of information

18
Q

edit check

A

programmed routines designed to check input data and ensure for completeness, accuracy and reasonableness (e.g. cannot enter a thirteenth month in the date field)

19
Q

Transport Layer Security (TLS)

A

The successor of the now-deprecated Secure Sockets Layer (SSL); it is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use as the Security layer in HTTPS remains the most publicly visible.

20
Q

disaster recovery plan

A

a plan that addresses the resources, actions, tasks, and data necessary to ­restore those services identified as critical, such as the EHR, as soon as possible, and to manage business recovery processes

21
Q

business continuity plan (BCP)

A

a set of policies and procedures that direct the CE how to continue its business operations during an information system shutdown

22
Q

emergency mode of operations

A

An emergency plan that defines the processes and controls that will be followed until the operations are fully restored.

23
Q

HIPAA security rule

A

The HIPAA Security Rule requires physicians/hospitals to protect patients’ electronically stored, protected health information (known as “ePHI”) by using the following five things:

  1. Administrative safeguards
  2. Physical safeguards
  3. Technical safeguards
  4. Organizational requirements
  5. Policies and procedures and documentation requirements
24
Q

sniffer

A

a software security product that runs in the background of a network, examining and logging packet traffic and serving as an early warning device against crackers

25
Q

hacker vs cracker

information security definition

A

A hacker is an individual whose job is to identify weaknesses in an information system so that they can be corrected. A cracker is an individual who exploits any weaknesses in an information system to his own advantage.

26
Q

unsecured electronic protected health information

A

ePHI that has not been made unusable, unreadable, or indecipherable to unauthorized persons

27
Q

deprecate

A
  1. to express disapproval of
  2. BELITTLE, DISPARAGE
  3. to withdraw official support for or discourage the use of (something, such as a software product) in favor of a newer or better alternative
  4. to seek to avert
28
Q

disparage

A

(1) to depreciate by indirect means (such as invidious comparison): speak slightingly about
(2) to lower in rank or reputation: DEGRADE

29
Q

invidious

A
  1. of an unpleasant or objectionable nature: OBNOXIOUS
  2. of a kind to cause harm or resentment
  3. tending to cause discontent, animosity, or envy
30
Q

disposition

A

1: prevailing tendency, mood, or inclination
2: temperamental makeup
3: the tendency of something to act in a certain manner under given circumstances
4: the act or the power of disposing or the state of being disposed: ADMINISTRATION, CONTROL, COURT’S FINAL DECISION
5: transfer to the care or possession of another
6: orderly arrangement