I


Implementation Specification:
A safeguard that includes specific instructions on how to implement the standard
Integrity:
Refers to keeping data, particularly EPHI, correct and complete.
Individual:
The person who is the subject of protected health information. [45 C.F.R. § 160.103].
Information system:
The interconnected set of information resources under the same direct management control that shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people. [45 C.F.R. § 164.304].
Internet Control Message Protocol (ICMP):
An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.
Internet Message Access Protocol (IMAP):
A protocol that defines how a client should fetch mail from and return mail to a mail server. IMAP is intended as a replacement for or extension to the Post Office Protocol (POP). It is defined in RFC 1203 (v3) and RFC 2060 (v4).
Internet Protocol (IP):
The method or protocol by which data is sent from one computer to another on the Internet.
Internet Protocol Security (IPsec):
A developing standard for security at the network or packet processing layer of network communication.
Integrity:
The property that data or information have not been altered or destroyed in an unauthorized manner. [45 C.F.R. § 164.304]
Intranet:
A computer network, especially one based on Internet technology that an organization uses for its own internal and usually private, purposes and that is closed to outsiders.
Intrusion Detection System:
A security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization).
IP Address:
A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols. An IP version 4 address is written as a series of four 8-bit numbers separated by periods.
IP Flood:
A denial of service attack that sends a host more echo request ('ping') packets than the protocol implementation can handle.
IP Spoofing:
The technique of supplying a false IP address.



HIPAA Security Implementation, Version 1.0
HIPAA Security Implementation, Version 1.0
ISBN: 974372722
EAN: N/A
Year: 2003
Pages: 181

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net