Computer Security Week 2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the name of the act that requires legal standards of confidentiality and compliance?

Health Insurance Portability and Accountability Act (HIPAA)

What are the types of safeguards that are required under HIPAA to protect electronic protected health information (e-PHI)?

Administrative, Physical, and Technical safeguards

Administrative Safeguards are the policies procedures that ensure security of electronic protected health information.

True (A)

Physical safeguards protect patient data by preventing unauthorized access to physical systems and data.

<p>True (A)</p> Signup and view all the answers

Technical safeguards are electronic protections that prevent unauthorized access to networks and data, making sure it is encrypted and protected with passwords and firewalls.

<p>True (A)</p> Signup and view all the answers

What are three antivirus software options mentioned?

<p>Norton Antivirus, McAfee Antivirus, Kaspersky Antivirus</p> Signup and view all the answers

What does a firewall do?

<p>A firewall acts as a barrier to prevent outsiders from detecting or accessing your computer.</p> Signup and view all the answers

What are two common characteristics of a reliable website?

<p>Websites ending in .org or .gov are generally considered reliable, and peer-reviewed materials provide the ultimate check for accuracy</p> Signup and view all the answers

Which of the following is NOT considered a characteristic of a reliable website?

<p>Website contains numerous advertisements (C)</p> Signup and view all the answers

What are the main components of the Internet?

<p>Thousands of interfacing computers and millions of computers networked worldwide.</p> Signup and view all the answers

What is the role of an Internet Service Provider (ISP)?

<p>An ISP is the commercial provider that provides your modem and internet access.</p> Signup and view all the answers

Flashcards

HIPAA Compliance

Legal standards set by HIPAA that protect patient health information.

Administrative Safeguards

Policies and procedures put in place by medical offices to ensure the security of electronic patient information (e-PHI).

Physical Safeguards

Measures taken to prevent unauthorized physical access to patient data.

Technical Safeguards

Electronic measures used to prevent unauthorized access to patient data over networks.

Signup and view all the flashcards

Password

Unique combination of characters used to access a system or account.

Signup and view all the flashcards

Unique Passwords

Using a separate password for each system or account.

Signup and view all the flashcards

Password Sharing

Ensuring that passwords are not shared with others.

Signup and view all the flashcards

Account Log Off

The practice of logging off accounts when not in use.

Signup and view all the flashcards

Password Expiration

A regular schedule for changing passwords to increase security.

Signup and view all the flashcards

Password Formula

A set of rules or guidelines for creating strong passwords, such as using a mix of letters, numbers, and symbols.

Signup and view all the flashcards

Data Backup

A copy of data stored in a different location, such as a server, flash drive, or external hard drive.

Signup and view all the flashcards

Remote Data Backup

The process of saving data to a remote location, protecting it from potential data loss on the main computer.

Signup and view all the flashcards

Virus Protection Software

Software designed to prevent malicious software from damaging or stealing information from a computer.

Signup and view all the flashcards

Antivirus Software

A type of virus protection software that protects against online threats.

Signup and view all the flashcards

Firewall

A barrier that prevents unauthorized access to a computer network from outside sources.

Signup and view all the flashcards

Cookies

Small files stored on a user's computer by websites, used to track browsing history and preferences.

Signup and view all the flashcards

Internet

A vast network of interconnected computers and networks worldwide.

Signup and view all the flashcards

Internet Service Provider (ISP)

A company that provides internet access to users through modems and connections.

Signup and view all the flashcards

Reliable Websites

Websites ending in '.org' or '.gov' are generally considered reliable.

Signup and view all the flashcards

Peer-Reviewed Material

Material reviewed by experts in the field to ensure accuracy.

Signup and view all the flashcards

Selecting a Reliable Website

The process of evaluating a website's reliability based on factors like source, date, and purpose.

Signup and view all the flashcards

Website Reliability Factors

Factors to consider when determining a website's reliability.

Signup and view all the flashcards

Wikipedia

A free online encyclopedia that allows anyone to edit content, making it unreliable as a primary source of information.

Signup and view all the flashcards

Fact vs. Opinion

The process of identifying and separating facts from opinions in online content.

Signup and view all the flashcards

Sources

Supporting information or evidence cited in a text.

Signup and view all the flashcards

Data Backup

Making copies of data and storing them in a secure external location.

Signup and view all the flashcards

Firewall

A barrier that prevents unauthorized access to a computer network from outside sources.

Signup and view all the flashcards

Antivirus Software

Software that protects your computer from malicious programs that can harm or steal your data.

Signup and view all the flashcards

Unique Passwords

The practice of using different passwords for different accounts, improving overall security.

Signup and view all the flashcards

Study Notes

Course: Computers

  • Week: 2

Computer Security

  • Legal standards: Compliance with Health Insurance Portability and Accountability Act (HIPAA) is required
  • Administrative safeguards: A medical office needs policies and procedures to ensure security of electronic protected health information (e-PHI).
  • Physical safeguards: Prevent unauthorized people from accessing patient data (e.g., privacy screens, locked screensavers, private offices/cubicles).
  • Technical safeguards: Electronic protections (firewalls) to prevent unauthorized access; data encrypted with passwords.

Security in General

  • (No specific details provided)

Passwords

  • Separate passwords for each system
  • Don't share passwords with coworkers
  • Log off accounts to prevent unauthorized use
  • Passwords can change every 30, 60, or 90 days
  • Some systems require specific formats (e.g., one capital letter, one number, or punctuation).

Security Passwords

  • (No specific details provided)

Data Backup

  • Copy all files to a remote location (server, flash drive, external hard drive, etc.)
  • Protects data if the machine is damaged or hacked
  • This is for restoring data.

System Maintenance

  • Virus protection software: Prevents malicious software from damaging or stealing information from your computer.
  • Anti-virus software examples: Norton, McAfee, Kaspersky.
  • Firewalls: Hardware or software barriers that prevent outsiders from accessing or detecting the existence of your computer system.

Computer Viruses

  • (No specific details provided)
  • (No specific details provided)

Internet/World Wide Web

  • Internet is a global network of interconnected computers.
  • Internet Service Provider (ISP) provides internet connection (e.g., Cable, Verizon)

Website Reliability

  • Websites ending in .org or .gov are generally considered reliable.
  • Peer-reviewed materials are often considered the most accurate.
  • Websites are reliable if their authors, publication dates, and source materials are clear

Selecting a Reliable Website

  • (Multiple slides about selecting reliable websites, no specific details provided.)

Reliable or Not?

  • Key Questions to Consider Reliable or Not:
    • What is the website and who created it?
    • How recent or updated is the website?
    • Are there advertisements?
    • Who are the authors and what are their credentials?
    • Why was the website created?
    • Can you discern facts from opinions?
    • Are sources easily available?

Computer Security Review

  • Review of previous topics with slightly different wording

Passwords Review

  • Review of password security, similar to the previous passwords section.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Security Basics
15 questions
Computer Security Chapter 10 Flashcards
16 questions
Computer Security & Privacy - Ch. 7
10 questions

Computer Security & Privacy - Ch. 7

SensationalChrysoprase468 avatar
SensationalChrysoprase468
Use Quizgecko on...
Browser
Browser