Module 4 Crossword

1234567891011121314
Across
  1. 5. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
  2. 6. It is short for malicious software.
  3. 7. Displaying unwanted advertisements and redirecting web browsers is an example of this.
  4. 8. This is the security principle that protects data from inappropriate modification or corruption.
  5. 10. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
  6. 11. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
  7. 12. Encrypted files or encrypted communication is unreadable to ________ viewers.
  8. 13. Hackers use software known as a packet sniffer to read ________ traffic.
Down
  1. 1. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
  2. 2. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
  3. 3. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
  4. 4. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
  5. 6. Process of attempting to reduce or eliminate harmful effects of the breach.
  6. 9. Antivirus software prevents, ________, and removes viruses.
  7. 14. This sends traffic from private networks to the Internet and from the Internet to private networks.