Computer Security Week 2
11 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the name of the act that requires legal standards of confidentiality and compliance?

Health Insurance Portability and Accountability Act (HIPAA)

What are the types of safeguards that are required under HIPAA to protect electronic protected health information (e-PHI)?

Administrative, Physical, and Technical safeguards

Administrative Safeguards are the policies procedures that ensure security of electronic protected health information.

True (A)

Physical safeguards protect patient data by preventing unauthorized access to physical systems and data.

<p>True (A)</p> Signup and view all the answers

Technical safeguards are electronic protections that prevent unauthorized access to networks and data, making sure it is encrypted and protected with passwords and firewalls.

<p>True (A)</p> Signup and view all the answers

What are three antivirus software options mentioned?

<p>Norton Antivirus, McAfee Antivirus, Kaspersky Antivirus</p> Signup and view all the answers

What does a firewall do?

<p>A firewall acts as a barrier to prevent outsiders from detecting or accessing your computer.</p> Signup and view all the answers

What are two common characteristics of a reliable website?

<p>Websites ending in .org or .gov are generally considered reliable, and peer-reviewed materials provide the ultimate check for accuracy</p> Signup and view all the answers

Which of the following is NOT considered a characteristic of a reliable website?

<p>Website contains numerous advertisements (C)</p> Signup and view all the answers

What are the main components of the Internet?

<p>Thousands of interfacing computers and millions of computers networked worldwide.</p> Signup and view all the answers

What is the role of an Internet Service Provider (ISP)?

<p>An ISP is the commercial provider that provides your modem and internet access.</p> Signup and view all the answers

Study Notes

Course: Computers

  • Week: 2

Computer Security

  • Legal standards: Compliance with Health Insurance Portability and Accountability Act (HIPAA) is required
  • Administrative safeguards: A medical office needs policies and procedures to ensure security of electronic protected health information (e-PHI).
  • Physical safeguards: Prevent unauthorized people from accessing patient data (e.g., privacy screens, locked screensavers, private offices/cubicles).
  • Technical safeguards: Electronic protections (firewalls) to prevent unauthorized access; data encrypted with passwords.

Security in General

  • (No specific details provided)

Passwords

  • Separate passwords for each system
  • Don't share passwords with coworkers
  • Log off accounts to prevent unauthorized use
  • Passwords can change every 30, 60, or 90 days
  • Some systems require specific formats (e.g., one capital letter, one number, or punctuation).

Security Passwords

  • (No specific details provided)

Data Backup

  • Copy all files to a remote location (server, flash drive, external hard drive, etc.)
  • Protects data if the machine is damaged or hacked
  • This is for restoring data.

System Maintenance

  • Virus protection software: Prevents malicious software from damaging or stealing information from your computer.
  • Anti-virus software examples: Norton, McAfee, Kaspersky.
  • Firewalls: Hardware or software barriers that prevent outsiders from accessing or detecting the existence of your computer system.

Computer Viruses

  • (No specific details provided)
  • (No specific details provided)

Internet/World Wide Web

  • Internet is a global network of interconnected computers.
  • Internet Service Provider (ISP) provides internet connection (e.g., Cable, Verizon)

Website Reliability

  • Websites ending in .org or .gov are generally considered reliable.
  • Peer-reviewed materials are often considered the most accurate.
  • Websites are reliable if their authors, publication dates, and source materials are clear

Selecting a Reliable Website

  • (Multiple slides about selecting reliable websites, no specific details provided.)

Reliable or Not?

  • Key Questions to Consider Reliable or Not:
    • What is the website and who created it?
    • How recent or updated is the website?
    • Are there advertisements?
    • Who are the authors and what are their credentials?
    • Why was the website created?
    • Can you discern facts from opinions?
    • Are sources easily available?

Computer Security Review

  • Review of previous topics with slightly different wording

Passwords Review

  • Review of password security, similar to the previous passwords section.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz covers essential aspects of computer security as discussed in Week 2 of the course. Topics include compliance with HIPAA, administrative, physical, and technical safeguards for electronic protected health information (e-PHI), along with best practices for password management and data backup. Test your understanding of these critical security measures.

More Like This

Computer Security Basics
15 questions
Computer Security Chapter 10 Flashcards
16 questions
Computer Security & Privacy - Ch. 7
10 questions

Computer Security & Privacy - Ch. 7

SensationalChrysoprase468 avatar
SensationalChrysoprase468
Use Quizgecko on...
Browser
Browser