Module 4 Crossword

123456789101112131415
Across
  1. 1. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
  2. 6. Process of attempting to reduce or eliminate harmful effects of the breach.
  3. 7. Displaying unwanted advertisements and redirecting web browsers is an example of this.
  4. 9. This is the security principle that protects data from inappropriate modification or corruption.
  5. 11. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
  6. 12. Hackers use software known as a packet sniffer to read ________ traffic.
  7. 13. Antivirus software prevents, ________, and removes viruses.
  8. 15. It is short for malicious software.
Down
  1. 2. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
  2. 3. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
  3. 4. Encrypted files or encrypted communication is unreadable to ________ viewers.
  4. 5. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
  5. 8. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
  6. 10. This sends traffic from private networks to the Internet and from the Internet to private networks.
  7. 14. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.