![]() |
||
| Lesson 2: HIPAA Security Rule Activity 2: Risk Analysis A covered entity should perform a risk analysis to determine potential risk to their information systems. Here are some threats (columns) and vulnerabilities (rows) that a covered entity may have to consider. What is the risk (high, medium or low) if these particular threats and vulnerabilities were triggered or exploited? Upon completion of this activity, please close the activity window to return to the course, and then select Next to continue. |
||