This class was created by Brainscape user Host Mom. Visit their profile to learn more about the creator.

Decks in this class (56)

Domain 1 - Healthcare Industry
Official (ISC)2 Guide to the HCISPP CBK
10  cards
1.1 Medical Business Operations
Controlled substance schedule 1,
Controlled substance schedule 2,
Controlled substance schedule 3
29  cards
1.2 Healthcare Data, Data Sets And Standards
Organized data,
Health data that has been organized,
What is the order when describing...
33  cards
1.3 HIS: Patient, personal, or population records
An his contains many individuals ...,
A digital patient record used wit...,
What does emr stand for
36  cards
Domain 1 EHRs
Patient s admitting dob and disch...,
Data grouped into meaningful cate...,
Raps
16  cards
1.4 HIS Divisions: Administrative, Departmental, Clinical, and Financial
What is the purpose of hit,
The _________ also facilitates co...,
When people talk about health inf...
18  cards
Domain 2 - Regulatory Environment
Official (ISC)2 Guide to the HCISPP CBK
10  cards
2.1 Regulatory Requirements
Healthcare clearinghouse,
Hhs operating divisions,
Version 5010
20  cards
2.2 HIPPA: Privacy and Confidentiality: Professional and Legal Responsibilities
Includes any information that ide...,
What is defined as all individual...,
What is included in identifying i...
82  cards
Domain 3 – Privacy and Security in Healthcare
Official (ISC)2 Guide to the HCISPP CBK
27  cards
3.1 Goals and Principles - What Is Security
What is a threat,
What is an attack,
What is an vulnerability
20  cards
3.2 Goals and Principles - Privacy
Who are the stakeholders of privacy,
Why do we need privacy,
What happens if we have no privacy
12  cards
3.3 Goals and Principles - Design Principles for Secure Systems
What does the principle economy o...,
What does the principle fail safe...,
What does the principle complete ...
12  cards
Authentication
What ist access control,
Attacks against passwords,
What are the risks of reusing a p...
8  cards
3.4 Introduction to Encryption
Which are the main security goals,
What does confidentiality mean,
What does data integrity mean
59  cards
3.4.1 Symmetric Cryptography
How many keys are used in symmetr...,
If you have the key and the encry...,
Cite some symmetric cryptographic...
28  cards
3.4.2 Symmetric Block Ciphers
Cite one of the most significant ...,
In which kind of cipher is differ...,
It is possible to attack des usin...
36  cards
RC4
Which kind of cypher is rc4,
What are the main characteristics...,
Which is the main goal of the str...
16  cards
AES
What does aes stands for,
Which algorithm does aes use,
Which are the main characteristic...
15  cards
Asymmetric Cryptography
How does the encryption process w...,
How does the message signing proc...,
In which mathematical problem the...
14  cards
Symetric Cryptography overview and comparations
What are the main advantages of s...,
What are the main advantages of b...,
What are the problems of symmetri...
4  cards
MAC & MDC
What are the main categories of m...,
What does mdc stands for,
What does mac stands for
25  cards
Most used MDC & MAC
What does md5 stands for,
What does sha stands for,
When md5 must not be considered t...
20  cards
Cryptographic Protocols
What is a cryptographic protocol,
Which additional characteristic a...,
What is data origin authentication
36  cards
Eliptic Curve Cryptography
What is the problem that diffie h...
1  cards
Applications of Cryptography
What are the goals of cryptography,
What is a hash function,
What are the requirements for a h...
11  cards
Security Management - Standards
What is risk managament about,
What is isms,
What is isms about
10  cards
Security Managment - Common Criteria
What are typical products which w...,
What are the common criteria cc,
What is a target of evaluation toe
20  cards
Domain 4 – Information Governance and Risk Management
Official (ISC)2 Guide to the HCISPP CBK
10  cards
Data Flow In HIT
Information system,
Clinical info system,
Hospital info system six primary ...
12  cards
Secure Operating Environments - OS Hardening
What are the top four strategies ...,
What is a secure base os,
How can we harden an os
8  cards
Trusted computing
What is a trusted platform module...,
What is a tpm chip,
What 3 basic services does a tpm ...
6  cards
Domain 5 – Information Risk Assessment
Official (ISC)2 Guide to the HCISPP CBK
10  cards
5.1 Orginizational Behavior Risks
Printer safeguards 4 points,
Screen lock,
Force log off
30  cards
IT Operations
Osi model,
Client server architecture,
Tcp
28  cards
Domain 6 – Third-Party Risk Management
Official (ISC)2 Guide to the HCISPP CBK
10  cards
Intro To Healthcare IT
Ehr emr,
Acute care long term care,
Clinical department
7  cards
Quiz 1
A
90  cards
HIT Chapter 1
What has incentivized the uptake ...,
What is the bureau of labor stati...,
In recent years what has added to...
4  cards
Quiz 2
Patient centered medical home pcmh,
Accountable care organization aco,
Shared savings program
57  cards
Quilt
Which two major types of data are...,
Which of the following terms refe...,
Which of the following functions ...
4  cards
Midterm
System team,
Team composition,
Fundamental activities of system ...
75  cards
Quiz 3
Core functions of it department o...,
Core functions of it department a...,
Core functions of it department s...
98  cards
Quiz 4
Ch. 10, 11, 12
100  cards
Secure Operating Environments - Access Control Datei
What is access control,
What is the differnce between aut...,
When do we need access control
16  cards
malware
What are the two categories that ...,
How can malware propagate propaga...,
What can malware do as a payload ...
4  cards
DPRC Review 2 True/False
Health information systems were o...,
An administrative function in an ...,
Recording insurance information i...
18  cards
DPRC Vocabulary 3-5
A record that is a combination of...,
When a respiratory therapist orde...,
When a computer system issues ale...
28  cards
DPRC Vocabulary
Formulary,
Edi,
Document imaging
33  cards
DPRC Session 6 and 7 Full Question Bank
In a centralized his the majority...,
Ris supports the function of spec...,
Pacs stands for personal archivin...
55  cards
DPRC Final Exam
Jcaho published to err is human t f,
Missing inaccurate and illegible ...,
Paper records are more effective ...
136  cards
DPRC CERTIFICATION TEST
A health record on a computer is ...,
What s the umbrella term develope...,
The __________ __________ _______...
121  cards
Random
Utilization review act of 1977,
Deterministic algorithms,
Overlay
24  cards
RHIA Exam Prep
Aaahc,
Aahp,
Abn
66  cards
Vocabulary
Administrative safeguards,
Affiliated covered entity ace
2  cards
HCISPP 2
Refers to preventing the disclosu...,
Two types 1 the person whom the a...,
The principle that states that sh...
234  cards

More about
HCISSP ISC2

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Host Mom's HCISSP ISC2 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Certified In Cybersecurity (CC) ISC2
  • 5 decks
  • 67 flashcards
  • 75 learners
Decks: Module 1, Module 2, Module 3 Security Controls, And more!
ISC^2
  • 2 decks
  • 76 flashcards
  • 81 learners
Decks: Unit 1 Vocab, Practice Exam, And more!
ISC2 CISSP
  • 8 decks
  • 246 flashcards
  • 18 learners
Decks: Security Risk And Management, Asset Security, Security Engineering, And more!
ISC2 CC
  • 7 decks
  • 189 flashcards
  • 17 learners
Decks: Chapter 1 Security Principles, Chapter 2 Ir Bc And Dr Concepts, Chapter 3 Access Control Concepts, And more!
Make Flashcards