Module 4 Crossword
Across
- 5. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
- 6. It is short for malicious software.
- 7. Displaying unwanted advertisements and redirecting web browsers is an example of this.
- 8. This is the security principle that protects data from inappropriate modification or corruption.
- 10. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
- 11. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
- 12. Encrypted files or encrypted communication is unreadable to ________ viewers.
- 13. Hackers use software known as a packet sniffer to read ________ traffic.
Down
- 1. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
- 2. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
- 3. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
- 4. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
- 6. Process of attempting to reduce or eliminate harmful effects of the breach.
- 9. Antivirus software prevents, ________, and removes viruses.
- 14. This sends traffic from private networks to the Internet and from the Internet to private networks.