this law improves the efficiency and effectiveness of the health care system and protects
patient privacy
Give this one a try later!
HIPAA (Health Insurance Portability and Accountability Act)
,a security method that involves shifting the contents of memory around to make
tampering difficult
Give this one a try later!
ASLR (Address Space Layout Randomization)
An attack that involves generating data, processes, communications, or other similar
activities with a system;
- affects primarily integrity and availability
Give this one a try later!
fabrication attack
a set of methods we use to establish a claim of identity as being true
corroborates the identity of an entity, whether it is the sender, the sender's computer,
some device, or some information
Give this one a try later!
authentication
a measure of the differences of a particular characteristic among a group of individuals
,Give this one a try later!
uniqueness
The risk management phase where we determine specifically what happened, why it
happened, and what we can do to keep it from happening again
Give this one a try later!
post-incident activity phase
Name 3 examples of exploit frameworks
Give this one a try later!
Metasploit, Immunity CANVAS, Core Impact
Uses one or more authentication methods for access
Give this one a try later!
multifactor authentication
, The 1st Law of Haas' Laws of Operations Security
Give this one a try later!
If you don't know the threat, how do you know what to protect?
A password is an example of this type of factor
Give this one a try later!
something you know
created to link a public key to a particular individual;
used as a form of electronic identification for that person
Give this one a try later!
certificate
A combination of DAC and MAC, primarily concerned with the confidentiality of the
resource.
- 2 security properties define how information can flow to and from the resource: the
simple security property and the * property
Give this one a try later!
patient privacy
Give this one a try later!
HIPAA (Health Insurance Portability and Accountability Act)
,a security method that involves shifting the contents of memory around to make
tampering difficult
Give this one a try later!
ASLR (Address Space Layout Randomization)
An attack that involves generating data, processes, communications, or other similar
activities with a system;
- affects primarily integrity and availability
Give this one a try later!
fabrication attack
a set of methods we use to establish a claim of identity as being true
corroborates the identity of an entity, whether it is the sender, the sender's computer,
some device, or some information
Give this one a try later!
authentication
a measure of the differences of a particular characteristic among a group of individuals
,Give this one a try later!
uniqueness
The risk management phase where we determine specifically what happened, why it
happened, and what we can do to keep it from happening again
Give this one a try later!
post-incident activity phase
Name 3 examples of exploit frameworks
Give this one a try later!
Metasploit, Immunity CANVAS, Core Impact
Uses one or more authentication methods for access
Give this one a try later!
multifactor authentication
, The 1st Law of Haas' Laws of Operations Security
Give this one a try later!
If you don't know the threat, how do you know what to protect?
A password is an example of this type of factor
Give this one a try later!
something you know
created to link a public key to a particular individual;
used as a form of electronic identification for that person
Give this one a try later!
certificate
A combination of DAC and MAC, primarily concerned with the confidentiality of the
resource.
- 2 security properties define how information can flow to and from the resource: the
simple security property and the * property
Give this one a try later!