My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Chapter 10 terms part 1

Horizontales
A program that bypasses normal authentication processes and allows access to computer resources
A set of procedures to be followed when responding to emergencies.
the technology and policies and procedures for its use that protect ePHI and controls access to it
the means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from unauthorized alteration, destruction, or loss
a collective term used to refer to any study that determines the benefit of a proposed project
security strategies, such as password management, included in application software and computer programs
methods should be used to identify both accidental and malicious events.
in cryptography, an asymmetric algorithm made a publicly available to unlock a coded message
a security mechanism used to grant users of a system access based on identity
two or more computers share the same secret key and that key is used to both encrypt and decrypt a message
stronger method of protecting data access than user identification with passwords include the use of smart cards or tokens with user identification
an electronic document that establishes a person's online identity
type of social engineering that uses email to try to obtain passwords and other personal information from individuals
review of access logs, audit trails, failed logins, and other reports generated to monitor compliance with the policies and procedures
Verticales
an estimate of the probability of threats occurring
involves assessing security threats and vulnerabilities, and the likely impact of any vulnerability.
an occurrence in a medical facility that is inconsistent with accepted standards of care
Controls contained in application software or computer programs to protect the security and integrity of information
attached to networks for the purpose of diverting transmitted data