In: Operations Management
(TCO 8) Malicious data modification or tampering is an attack against
data confidentiality.
data integrity.
data availability.
data accountability.
Question 105 pts
(TCO 9) A threat assessment is a(n)
identification of types of threats an organization might be exposed to.
systematic rating of threats based upon level of risk and probability.
potential level of impact.
likelihood of a threat materializing.
Question 115 pts
(TCO 10) When it comes to HIPAA, which of the following does PHI stand for?
Public health information
Public health institution
Protected health information
Protected health institution
Question 125 pts
(TCO 10) The administrative safeguards say that a risk assessment is
suggested.
not needed.
recommended.
required.
Question 1: data integrity
Explanation: Data integrity refers to the protection of overall completeness, accuracy, and consistency of data in a database in such a way that it is not tampered by malicious information.
Question 2: identification of types of threats an organization might be exposed to
Explanation: Threat Assessment is the practice of determining the vulnerabilities of a potential threat that can adversely affect operations or specific assets and the probability that the threat will occur.
Question 3: Protected health information
Explanation: The protected health information refers to any health information that is in a medical record of an individual that is created, received, or maintained by HIPPA (Health Insurance Portability and Accountability Act) covered entities.
Question 4: required
Explanation: As per the administrative safeguards, risk assessment is required so that the health information is ensured to be secure by conduction a thorough risk analysis. It also helps to identify the potential risks and indicate where protected health information is potentially vulnerable.