The information assurance concept in which multiple layers of security controls are placed throughout an information technology system.
What is Defense in Depth
These are the 3 primary security principles
What are Confidentiality, Integrity, Availability
A self replicating program that reproduces its code by attaching copies into other executable applications
What is a Virus
This law is part of ARRA in 2009 and directly impacts HealthCare industry and mandates HIPAA compliance
What is HITECH Act
A human attack involving manipulating a person or a group of people into providing sensitive information.
What is Social Engineering
An emulation of a computer system, providing security features like isolation from your host operating system, quick recoveries using snapshots, and the ability to test suspicious softwares and files.
What is a Virtual Machine
This type of data is protected by HIPAA regulation
What is PHI
This virus is named after a story in Greek Mythology
What is a Trojan
In 1996 this healthcare regulation was passed
What is HIPAA
It is not 'outside' of possibilities that this threat poses the highest risk to an organization
Who are Insiders or Employees
There are 7 layers in this networking model
What is The OSI Model
This government organization is responsible for enforcing HIPAA regulations
Department of Health and Human Services or Office of Civil Rights
A software designed to harm or secretly access a computer system without the owner's consent
What is Malware
Information in a medical record that can be used to identify an individual, and that was created, used, or disclosed in the course of providing a health care service, such as a diagnosis or treatment.
What is PHI
A cyber attack where someone simply looks over the shoulder of a user and gathers credentials, sensitive data etc.
What is Shoulder Surfing
Isolating business data and processes away from personal processing on a mobile device is a construct known as this
What is Sandboxing
These small files located on your computer are used to collect data during visits to web sites
What are Cookies
This malware locks you out of your own system resources and demands on online payment to release them back.
What is Ransomware
Security assessment designed to check policies and procedures within an organization
What is a Security Audit
A cyber attack where an attacker waits next to an entry door to a secured location. An authorized user opens the door and the attacker follows them inside.
What is Piggybacking
The initial analysis and response to an incident based on information known when an incident is first reported is known as this
What is Triage
Any information that can be used to trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records.
What is PII
A self replicating malware that uses a computer network to send copies of itself to other computers without human intervention
What is a Worm
The email contact at Vituity if you have a compliance concern.
What is Compliance@vituity.com?
The group you should contact if you've fallen prey to a social engineering attack
Who is the Service Desk