Lesson 2:  HIPAA Security Rule
Activity 2:  Risk Analysis

A covered entity should perform a risk analysis to determine potential risk to their information systems. 
Here are some threats (columns) and vulnerabilities (rows) that a covered entity may have to consider.
What is the risk (high, medium or low) if these particular threats and vulnerabilities were triggered or exploited?

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Upon completion of this activity, please close the activity window to return to the course,
and then select Next to continue.