CompTIA HIT-001 Flashcards
802.11
A family of specification developed by the IEEE for wireless LAN technology.
802.11a
a fast, secure, but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11b
Also called Wi-Fi, short for wired fidelity, “802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device and a wired LAN. The 802.11b protocol provides for an 11Mbps transfer rate in the 2.4GHz frequency.
802.11g
A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
802.11i
A standard that adds AES security to the 802.11 standard
802.11n
A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b
802.1x
An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
Acuity
The acuteness, or level of severity, of an illness or disease.
ad hoc
A type of network that is established spontaneously through a peer-to-peer wireless connection.
adware
Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
ambulatory care
Any medical treatment or services provided on an outpatient basis.
antivirus software
A software program that scans a Computer or network for known viruses, Trojans, worms, and other malacious software.
AP (Access Points)
A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
API (Application Programming Interface)
Application code that enables various applications to communicate with each other.
Application Server
A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.
Applications
Software components that allow users to perform specific tasks and job functions on a computer.
Archive Flag
A file property that essentially indicates whether the file has been modified since the last back up.
ARP Poisoning
A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP(Address Resolution Protocol)
The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.
ARRA (American Recovery and Reinvestment Act
U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.
ASP (Active Server Pages)
A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Assisted Living Facility
A residential facility or community for patients who may need assistance with some functions of daily living, such as bathing or medication reminders, but can otherwise remain mostly independent.
ATA (Advanced Technology Attachment)
The official ANSI term for IDE drives.
Availability
The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.
BAA
(Business Associate Agreement)A document that defines the authorized uses of PHI and how the information is to be used and managed.
Barcode Scanner
A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
Bedside Medication Verification
A checks-and-balances systems that ensures that a patient is receiving the correct medication, the correct dose of medication at the correct time, from an authorize caregiver by requiring that bar codes storing information about the patient medication m and possible the administering personnel be scanned and verified prior to the medication being dispensed.
Billing and Coding Software
Software that provides one location where charges are entered codes can be checked, insurance claims and statements can be generated and sent , claim denials can be managed and payments can be posted and processed.
Billing Clearinghouse
The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.
Biometrics
Authentication schemes based on individuals’ physical characters.
Bluejacking
A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones , tablets and laptops to other Bluetooth-enabled devices.
Bluesnarfing
A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.
Bluetooth
A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset.
Break Glass Access
Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.
Camera
A device used to take pictures of patients, because some EMR/EHR systems allow for a patient’s picture to be tied to their electronic record.
Card/Badge Scanner
A device used often to scan patient’s driver licenses or insurance card to store withing the EMR/EHR system.
CCD
(Continuity of Care Document)A healthcare record standard, similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
CCHIT
(Certification Commission for Health Information Technology)
CCMP
(Counter Mode with Cipher Block Changing Message Authentication Code Protocol) An AES cipher-based encryption protocol used in WPA2.
CCR
(Continuity of Care Record) A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical caregivers regardless of their respective EMR or EHR software applications.
Centralized
A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.
Certified EHR System
An EHR system that had been certified by ONC
Change Management
A systematic way of approving and executing changing in order to assure maximum security, stability and availability of information technology services.
CIA Triad
(Confidentiality, Integrity, Availability) The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.
Client-Server
A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Cloud Computing
A method of computing that relies on the Internet to provided the resources, software, data and media needs of a user, business, or organization.
CMS
(Centers for Medicare and Medicaid Services) A U.S. federal agency responsible not only for overseeing its named services but also for administering a children’s insurance program, some portions of HIPAA, and other programs.
Coaxial Cable
A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmitter over the central conductor. The outer shielding serves to reduce electromagnetic interference.
Code Blue
Term used to communicate that a patient has gone into cardiac arrest, and immediate medical attention/ rapid response is needed to resuscitation the patient.
Confidentiality
The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.
Continuing Care Facility
A residential facility “steps” of care based on the residents’ needs:Residents can start out with more Independence though assisted living, with the comfort of knowing nursing home care is available at the same facility when they can no longer remain independent.
Controlled substance
Any drugs or chemical substance that is regulated by the federal government in its production, possession, or use, including illegal and prescription drugs.
Covered Entity
Any healthcare provider that conducts certain transactions in electronic form, a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entities must adhere to the HIPAA Privacy Rule and Security Rule.
CPOE
(Computerized Physician Order Entry) Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.
CPT
(Current Procedural Terminology) A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures, which is published every year by the American Medical Association.
Custodian
The role, department, or individual that is formally responsible for a health record.
Daily Backup
A backup that backs up all selected files on a daily basis.
Data Sanitation
The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.
Data Wiping
A method used to remove any sensitive data from a mobile device and permanently delete it.
Database Server
A server that provides database services to other computers in a network.
DBA
(Database Administrator) An IT role that is responsible for designing, implementing, maintaining, and repairing databases. Usually also responsible for the security of an organization’s database system and all the data stored on the systems.
DC
(Domain Controller) A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC’s
DDoS
(Distributed Denial of Service) A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)
Degaussing
A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data, so that it cannot be recovered
Desktop Support
An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
DHCP Server
A server that contains at least one DHCP scope.
DHCP
(Dynamic Host Control Protocol) A Protocol used to automatically assign IP addressing information to IP network computers.
Differential Backup
A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Display Devices
Personal computer components that enable users to view the text and graphical data output from a computer.
DNS Server
A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
DNS
(Domain Name System) The service that maps names to IP addresses on most TCP/IP networks, including the Internet.
Document Imaging
Electronic conversion of hard copy documents to digital form.
Document Scanner
A device used to convert paper to electronic format and then associates the file with the proper patient.
DoS
(Denial of Service attack)A network attack in which an attacker disables systems that provide network services by consuming a networks link’s available bandwidth, consuming a single system’s available resources, or exploiting programming flaws in an application or operation system.
Drone
Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.
DRP
(Disaster Recovery Plan) A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.
Drug Allergy
Any adverse reaction to a medication being taken.
e-Prescribing
The transmission of a patient’s prescription for medication electronically from the describer’s computer to the pharmacy’s computer.
E/M Codes
(Evaluation and Management Codes) Five-digit CPT codes used to describe a medical professional-patient interaction, such as an office visit or a hospital, to facilitate in the billing process.
EAP
(Extensible Authentication Protocol) An authentication protocol that enables systems to use hardware-based identifiers , such as fingerprint scanners or smart card readers, for authentication.
Eavesdropping
A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.
ED
(Emergency Department) An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury, before being admitted for further treatment by another department.
EHR
(Electronic Health Record) The consolidation of all of the recorded health information about a person stored withing a given network. EHR’s generally contain multiple EMR’s collected from various facilities and providers within a provider network or umbrella organization.
Eligible Provider
A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.
Electronic messages sent between users or groups.
EMI
(Electromagnetic Interference) disturbances caused by electromagnetic radiation emitted from any external source, which may interrupt, obstruct, degrade, or limit the performance of an electrical circuit.
Encryption
A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Examination Room
A private room where a patient is examined and diagnosed by a medical practitioner.
External Devices
Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
Fax Printer
A device used to fax prescription or to print out prescription information for the EMR/EHR system.
Fax Server
A device that manages all fax messages sent with a network.
FDA
(Food and Drug Administration) The federal agency that oversees the regulation of food safety, tobacco products, prescription and over-the-counter medication, dietary supplements, vaccines, medical devices, sanitation requirements, and other related public health products and services.
Fiber
A type of cable in which one or more glass or plastic strands, plus additional fiber strands or wraps, are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
File Server
A server that is primarily used to share, store, and access files.
Final Rule
An effort to set standards, specifications, and criteria for the implementation, use, and security of healthcare IT systems.
Fire Suppression
A system that extinguishes fire using special gases.
Firewall
A software or hardware device that protects a system or network by blocking unwanted network traffic.
FireWire Connection
A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394, but is now used interchangeably.
Flash
An Adobe platform that allows developers to create animations, videos, and other interactive components using the ActionScript programming language.
Float Room
Any room used to temporarily house patient when they are in transition between their patient room and another location, such as before or after testes or surgeries.
For-Profit Hospital
An investor-owned hospital, usually owned by a corporation or group of private individuals, that aims to gain profits for the services provided which are then paid to those invested in the ownership.
Formulary Checking
the automatic process for checking a prescription for medication against a patents’s known allergies for possible drug-allergy reactions, and against current medications for possible adverse drug-drug interactions.
FTP Server
A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.
FTP
(File Transfer Protocol) A communication protocol that enables the transfer of files between a user’s workstation and a remote host
Full Backup
A backup that backs up all selected files regardless of the state of the archived bit.
General/Community Hospital
a hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care, and performs general surgeries.
Hardware Attack
An attack that targets a computer’s physical components and peripherals, including hard disk, motherboard, keyboard network cabling, or smart card reader.
HDD
(Hard Disk Drive) a personal computer storage device that uses fixed media and magnetic data storage.
HHS
(U.S. Department of Health and Human Services) The U.S. Agency charged with protecting the health of the population and providing various human services.
HIPAA
(Health Insurance Portability and Accountability Act) A U.S. law that established rules for the governance of health information privacy, security, breach notification administrative simplification, and enforcement.
HITECH
Health Information Technology for Economic and Clinical Health Act) the part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
HL7
Specific healthcare industry standards and a framework concerning the exchange and integration of patient’s electronic information between software systems, which are adhered to by vendors developing interfaces, ensuring that of this disparate software applications are used by healthcare organizations and the interfaces that communicate between them are all speaking the same electronic language to accurately exchange patient medical data.
Hoax
Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Home Healthcare
A wide variety of medical services that are provided in a patient’s home by an accredited home health aide, often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy, etc.
Hospice Care
A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient’s family during end-of-life.
Host Computer
A powerful, centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
HTML
(Hypertext Markup Language) The standard language that defines how web pages are formatted and displayed.
HTTPS
(Hypertext Transfer Protocol Secure) A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
Human Interface Devices
Hardware components that enable users to interact with computers.
IaaS
(Infrastructure as a Service) A method that uses the cloud to provide any or all infrastructure needs.
ICD-10
(International Statistical Classification of Diseases and Related Health Problems, 10th revision) One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases, signs and symptoms, possible complaints, abnormalities, and possible causes of injuries and diseases..\
ICMP
(Internet Control Message Protocol) A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
IDF
(International Distribution Frame) Systems that store networking hardware and provide networking services to local area networks within a medical environment.
IDS
(Intrusion Detection System) A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.