forked from aligator4sah/Telehealth
-
Notifications
You must be signed in to change notification settings - Fork 0
/
keyterms.html
311 lines (218 loc) · 13.8 KB
/
keyterms.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
<!DOCTYPE html><html lang="en">
<head>
<!-- Basic informations -->
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<!-- Site informations -->
<title>Key terms</title>
<!-- Open Graph -->
<meta property="og:title" content="Free Aurora Template">
<meta property="og:description" content="Free HTML5 Template created by Dominik Serafin.">
<meta property="og:url" content="http://serafin.io/aurora-template/">
<meta property="og:image" content="http://serafin.io/aurora-template/content/og_image.png">
<!-- Fonts -->
<link href="style/fonts/webfont-raleway/webfont-raleway.css" rel="stylesheet" type="text/css">
<link href="style/fonts/webfont-font-awesome/css/font-awesome.css" rel="stylesheet" type="text/css">
<!-- Stylesheets -->
<link href="style/css/global.css" type="text/css" rel="stylesheet" media="all">
<!-- Scripts preload -->
<!--[if lt IE 9]><script src="style/js/html5shiv.js"></script><![endif]-->
<style>
input[type=checkbox]
{
/* Double-sized Checkboxes */
-ms-transform: scale(2); /* IE */
-moz-transform: scale(2); /* FF */
-webkit-transform: scale(2); /* Safari and Chrome */
-o-transform: scale(2); /* Opera */
padding: 10px;
width: 30px;
}
/* Might want to wrap a span around your checkbox text */
.checkboxtext
{
/* Checkbox text */
font-size: 110%;
display: inline;
}
b
{
color: white;
font-size: 20px;
}
a
{
color: #CCD9CE;
font-size: 20px;
}
p
{
color: white;
font-size: 18px;
}
</style>
</head>
<body>
<!-- Some Helper Stuff -->
<div id="start" class="start"> </div>
<div class="maxwidth1050"> </div>
<!-- Header -->
<header class="header">
<div class="header__wrapper">
<div class="header__hamburger">
<div class="header__hamburger-block"> </div>
<div class="header__hamburger-block"> </div>
<div class="header__hamburger-block"> </div>
</div>
<a href="#start" class="header__title-wrapper js-smooth-scroll">
<div class="header__title-main">Tele Health</div>
<div class="header__title-sub">By School of Health and Rehabilitation</div>
</a>
<div class="header__social-icons">
<ul class="w3-navbar w3-blue">
<a href="keyterms.html"><h5>Key terms</h5></a>
</ul>
</div>
</div>
</header>
<!-- End Header -->
<section id="contact" class="contact">
<div class="contact__wrapper">
<div class="section-header">
<div class="section-header__title section-header__title--contact">Key terms. . .</div>
<div class="section-header__subtitle">Definition of key terms</div>
</div>
<br><a name="anchor1">
1. <b>Unauthorized</b> - Occurs when a user, legitimate or unauthorized, accesses a resource
that the user is not permitted to use. Any access that violates the stated security policy. </br>
<br><a name="anchor2">
2. <b>Access Control</b> - The process of granting or denying specific requests to: 1) obtain and
use information and related information processing services; and 2)
enter specific physical facilities (e.g., federal buildings, military
establishments, border crossing entrances).</br>
<br><a name="anchor3">
3. <b>Advanced Encryption Standard (AES)</b> - The Advanced Encryption Standard specifies a U.S. governmentapproved
cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that
can encrypt (encipher) and decrypt (decipher) information. This standard specifies the Rijndael algorithm, a symmetric
block cipher that can process data blocks of 128 bits, using cipher keys with
lengths of 128, 192, and 256 bits. </br>
<br><a name="anchor4">
4. <b>Antivirus Software</b> - A program that monitors a computer or network to identify all major
types of malware and prevent or contain malware incidents. </br>
<br><a name="anchor5">
5. <b>Authentication</b> - Verifying the identity of a user, process, or device, often as a
prerequisite to allowing access to resources in an information system. Encompasses identity verification, message origin authentication, and message content authentication.The process of verifying the identity or other attributes claimed by or
assumed of an entity (user, process, or device), or to verify the source and integrity of data. </br>
<br><a name="anchor6">
6. <b>Authorization</b> - Access privileges granted to a user, program, or process or the act
of granting those privileges. </br>
<br><a name="anchor7">
7. <b>Backup</b> - A copy of files and programs made to facilitate recovery, if
necessary. </br>
<br><a name="anchor8">
8. <b>Bit</b> - A contraction of the term Binary Digit. The smallest unit of
information in a binary system of notation. A binary digit having a value of 0 or 1. </br>
<br><a name="anchor9">
9. <b>Certification</b> - A comprehensive assessment of the management, operational, and
technical security controls in an information system, made in support
of security accreditation, to determine the extent to which the
controls are implemented correctly, operating as intended, and
producing the desired outcome with respect to meeting the security
requirements for the system. </br>
<br><a name="anchor10">
10. <b>Digital Signature</b> - An asymmetric key operation where the private key is used to digitally sign data and
the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity
protection, and non-repudiation. </br>
<br><a name="anchor11">
11. <b>Disaster Recovery Plan (DRP)</b> - A written plan for recovering one or more information systems at an
alternate facility in response to a major hardware or software failure or destruction of facilities. </br>
<br><a name="anchor12">
12. <b>Encryption</b> - Conversion of plaintext to ciphertext through the use of a cryptographic algorithm. </br>
<br><a name="anchor13">
13. <b>Encrypted Key</b> - A cryptographic key that has been encrypted using an Approved security function with
a key encrypting key, a PIN, or a password in order to disguise the value of the underlying plaintext key. </br>
<br><a name="anchor14">
14. <b>Encryption Algorithm</b> - Set of mathematically expressed rules for rendering data
unintelligible by executing a series of conversions controlled by a key. </br>
<br><a name="anchor15">
15. <b>Entity</b> - Either a subject (an active element that operates on information or the system state) or an object
(a passive element that contains or receives information). </br>
<br><a name="anchor16">
16. <b>Firewall</b> - A gateway that limits access between networks in accordance with local security policy. </br>
<br><a name="anchor17">
17. <b>Identifier</b> - Unique data used to represent a person’s identity and associated
attributes. A name or a card number are examples of identifiers. </br>
<br><a name="anchor18">
18. <b>Incident Response Plan</b> - The documentation of a predetermined set of instructions or procedures to detect,
respond to, and limit consequences of a malicious cyber attacks against an organization’s information system(s). </br>
<br><a name="anchor19">
19. <b>Mobile Device</b> - Portable cartridge/disk-based, removable storage media (e.g., floppy
disks, compact disks, USB flash drives, external hard drives, and other flash memory cards/drives that contain nonvolatile memory). </br>
<br><a name="anchor20">
20. <b>Multifactor Authentication</b> - Authentication using two or more factors to achieve authentication. Factors include:
(i) something you know (e.g.,password/PIN);
(ii) something you have (e.g., cryptographic identification device, token); or
(iii) something you are (e.g., biometric). </br>
<br><a name="anchor21">
21. <b>Password</b> - A protected character string used to authenticate the identity of a computer system user or to authorize access to system resources. </br>
<br><a name="anchor22">
22. <b>Privacy</b> - Restricting access to subscriber or Relying Party information in accordance with federal law and agency policy. </br>
<br><a name="anchor23">
23. <b>Protected Health Information (PHI)</b> - The HIPAA Privacy Rule provides federal protections for personal health information
held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy
Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important
purposes. </br>
<br><a name="anchor24">
24. <b>Remote Access</b> - Access to an organizational information system by a user (or an information system acting on behalf of a user) communicating
through an external network (e.g., the Internet). </br>
<br><a name="anchor25">
25. <b>Risk</b> - The level of impact on organizational operations (including mission, functions, image, or reputation),
organizational assets, or individuals resulting from the operation of an information system given the potential impact
of a threat and the likelihood of that threat occurring. </br>
<br><a name="anchor26">
26. <b>Security</b> - A condition that results from the establishment and maintenance of protective measures that enable
an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems.
Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction
that should form part of the enterprise's risk management approach. </br>
<br><a name="anchor27">
27. <b>Software</b> - Computer programs and associated data that may be dynamically written or modified during execution. </br>
<br><a name="anchor28">
28. <b>System</b> - Any organized assembly of resources and procedures united and regulated by interaction or interdependence to accomplish a set of
specific functions. </br>
<br><a name="anchor29">
29. <b>Transmission</b> - The state that exists when information is being electronically sent from one location to one or more other locations. </br>
<br><a name="anchor30">
30. <b>Virtual Private Network (VPN)</b> - A virtual network, built on top of existing physical networks, that
provides a secure communications tunnel for data and other information transmitted between networks.</br>
<br><a name="anchor31">
31. <b>Wi-Fi Protected Access-2 (WPA2)</b> - The approved Wi-Fi Alliance interoperable implementation of the
IEEE 802.11i security standard. For federal government use, the implementation must use FIPS-approved encryption, such as AES.</br>
<br><a name="anchor32">
32. <b>Business Associate Agreement (BAA)</b> - A "business associate" is a person or entity, other than a member of the workforce of a covered entity, who performs functions or activities on behalf of, or provides certain services to, a covered entity that involve access by the business associate to protected health information. A "business associate" also is a subcontractor that creates, receives, maintains, or transmits protected health information on behalf of another business associate. The HIPAA Rules generally require that covered entities and business associates enter into contracts with their business associates to ensure that the business associates will appropriately safeguard protected health information.</br>
<br><a name="anchor33">
33. <b>Cloud Computing</b> - A model for enabling on-demand network access to a shared pool of configurable IT capabilities/ resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider
interaction. It allows users to access technology-based services from the network cloud without knowledge of, expertise with, or control
over the technology infrastructure that supports them. This cloud model is composed of five essential characteristics (on-demand selfservice,
ubiquitous network access, location independent resource pooling, rapid elasticity, and measured service); three service
delivery models (Cloud Software as a Service [SaaS], Cloud Platform as a Service [PaaS], and Cloud Infrastructure as a Service [IaaS]);
and four models for enterprise access (Private cloud, Community cloud, Public cloud, and Hybrid cloud). </br>
<br></br><br></br>
<br> Source: http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf
</div>
</section>
<!-- End "Contact" Section -->
<!-- Footer -->
<!-- <footer id="footer" class="footer">
<div class="footer__wrapper">
<div class="footer__copyright">Some Rights Reserved © 2017</div>
<a href="http://serafin.io/?utm_source=Aurora-Template&utm_medium=Footer-Image&utm_campaign=Freebie" target="_blank" class="footer__image"> </a>
</div>
</footer>
<!-- End Footer -->
<!-- Scripts postload -->
<script src="style/js/dependencies.min.js" type="text/javascript"></script>
<script src="style/js/global.js" type="text/javascript"></script>
</body>
</html>