• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back

Confidentiality

Condition in which information is shared or released in a controlled way - HIPAA defines it as ePHI is not available or dissclosed to unauthorized persons

Security

A number of measures that organizations implement to protect . This includes efforts not only to maintain the confidentiality but also to maintaine integrity and access to the information

Privacy

An individuals desire to limit disclosure of personal information

Moore's Law

The number of transistors on an integrated Circut doubles every two years (allows computers to do billions of calulations per second)

FLOP

Floating-Point Operations per second unit of how fast computers calculate (a giga-FLOP is a billion calcuations)

RISC and CISC

Reduces Instructions Sets Computer- reduces clock cycle per insturction (more instructions shorter time to run them - all instructions usu same length (longer more RAM, but


Complex Instruction Sets Computer - less instructions more time to do them (variable lenghth

Public/Private Key encryption

Public - the encyption key widely distributed so can be sent in non-secure fashion. The decrypt key is secret and only held by the receipient

HIPPA Breechs

Over 500 - media and and HHS sec needs to be notified, Affected individuals need to be notified in 60 days.

RFID

Radio frequency Identification - is technology for identifying a physical object or person using small chip - not a security thing

IDPS


NAC


DLP

IDPS - Intrusion Detection and prvention system


NAC - network access control


DLP - data leakage protection

Hick-Hyman Law


Key-stroke level model

Expresses users response time as a function of the number of options they have to pick from


RT= a+b*Log2n with n as number of options



Key-stroke level model - time to find and hoan in on and clik item - used to find when there is a hot key option

Usabilty Evaluation 3 catagories of evaluation

Testing: 1. Coaching 2 Thinking out loud


3 Eye tracking/click tracking 4. performance


Inspection:


1. cognicitve walk through 2. Herustics


Inquiry: 1Field observation 2. Focus group


3. Surveys 4. Usage logs

Neilsen 10 prinicples of usability

1. System status should be visiable
2. Match between terms used and "real world terms used in the dicipline
3. User control and freedom: Users often choose system functions by mistake and will need a clearly marked "emergency exit" to leave Support undo and redo.

Neilsen 10 prinicples of usability

4. Consistency and standards: Users should not have to wonder whether different words, situations, or actions mean the same thing.


5. Error prevention: Even better than good error messages is a careful design that prevents a problem from occurring in the first place. E

Neilsen 10 prinicples of usability 6-9

6. Recognition rather than recall: Minimize the user's memory load by making objects, actions, and options visible - dont make them memorize sequences


7. Short cuts and accelerators for novices and experts


8. Dialogue should be minimal

Neilsen 10 prinicples of usability 9-10

9. Help users recognize, diagnose, and recover from errors: Error messages should be expressed in plain language (no codes), precisely indicate the problem, and constructively suggest a solution.


10. Help and documentation: Even though it is better if the system can be used without documentation, it may be necessary to provide help and documentation.