Information Security Quiz #15
Across
- 1. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- 2. In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
- 6. This can slow down your computer AND watch everywhere you go on the internet.
- 8. Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
- 9. Tapping confidential information from trash
- 11. You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
- 13. Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
- 15. Use this tool to dispose of documents that contain personal or financial information.
Down
- 1. The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
- 3. The front line of defence in information security!
- 4. Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
- 5. Destruction of computer equipment or records
- 7. Records of IS activities
- 10. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- 12. Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
- 14. A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.