Compliance & Security Week Part 2!

12345678910111213141516
Across
  1. 2. What are all DDID/AHS employees supposed to wear so it can be seen as a best practice of security?
  2. 5. What is the term for the agreement between covered entities and business associates?
  3. 6. What is the term for malicious software?
  4. 9. The person that exploits vulnerabilities for malicious purposes
  5. 12. Who is the DDID Security Officer?
  6. 14. What is the process of converting data into a secure format?
  7. 15. What confidential information does DDID protect?
  8. 16. What color is the HIPAA Hippo?
Down
  1. 1. What is the over the phone voice call type of scam?
  2. 3. What is the term for a security incident that disrupts services?
  3. 4. Who is the HR Reporting Officer?
  4. 7. What is the process of verifying identity?
  5. 8. This occurs when an unauthorized person gains access to sensitive or protected information
  6. 10. What is the term for a legal requirement to protect data?
  7. 11. The document that outlines security practices
  8. 13. You are the first line of ____ in protection DDID and AHS
  9. 15. What's an organization's overall ability to protect against, detect, respond to and recover from cyber threats? (It's like a straight back when you sit or stand)