HIPAA Lesson 7 Flashcards
What are the three rules of the Administrative Simplification?
- Standards for Electronic Transactions, Code Sets, and Identifiers
- The Privacy Rule
- The Security Rule
_______ means having controls, countermeasures, and procedures in place to ensure the appropriate protection of your information assets.
Security
In the 1990s, governmental organizations from Canada, France, Germany, the Netherlands, the United Kingdom, and the United States created the _______.
Common Criteria
Good security _______ the vulnerability of assets and resources.
minimizes
An ______ is anything of value.
asset
______ is any weakness that someone could exploit to violate a system or the information it contains.
Vulnerability
A ______ is a potential violation of security.
threat
In the Common Criteria model, ______ include all those who are accountable for or place value on the assets in question.
owners
______ seek to abuse or damage assets. Owners assume that the threats may harm the assets in a way that will reduce their value.
Threat agents
______ is the danger of various threats and attacks on an organization’s assets.
Risk
______ is the process of proving your identity to a system or network.
Authentication
The authentication processes that uses a person’s physical traits, like a thumbprint or retinal scan, to confirm identity.
Biometrics
______ ensures that only authorized users access a system and rejects (repudiates) all unauthorized users.
Access control
______ ensures the privacy of data on the system and network.
Data confidentiality
______ assures that data hasn’t been altered or destroyed in any unauthorized manner—either accidentally, intentionally, or due to some type of system failure.
Data integrity
______ means that you make a copy of your data to protect against data loss.
Data Backup and Recovery
______ can result from environmental hazards like a flood or fire, failed hard drives or other media, or accidental deletion of data.
Data loss
______ is the denial of access to a system, such as entering your password incorrectly and being denied access to an account?
Repudiation
______ of an access attempt means that it’s possible to verify the user’s identity and allow him or her to access the system, such as entering your password correctly and gaining access to your account.
Nonrepudiation
List the three components of Risk management: (AUE)
- Analyzing the results of the required risk assessment
- Updating policies, procedures, and practices to protect against identified threats and vulnerabilities
- Enforcing appropriate security program requirements
______ means collecting data and evaluating the effectiveness of the business’s security program. Audit data includes logs, predefined reports, reports related to threats, vulnerabilities identified during risk assessment, policies and procedures, and so on.
Audit and system monitoring
The “system” part of audit and system monitoring means checking the information technology system you’re using. List several goals to keep in mind here: (P-DISC)
- Apply patches (fixes) as necessary.
- Make sure security is in place and working properly.
- Confirm that data is available as needed.
- Keep data confidential.
- Protect the integrity of the data. In other words, make sure it isn’t stolen, tampered with, degraded, or lost.
List the two types of security mechanisms:
Specific and Pervasive