This is a self-contained program that uses security flaws such as buffer overflow to remotely compromise a system and then replicate itself to that system. Identify this program (threat):
The objective of this implementation specification is to conduct an accurate and thorough assessment of the potential vulnerabilities to the confidentiality, integrity and availability of electronic protected health information held by the covered entity.
The Contingency Plan standard includes this addressable implementation specification:
This is a documented and routinely updated plan to create and maintain, for a specific period of time, retrievable copies of information:
The objective of this standard is to perform a periodic review in response to environmental or operational changes affecting the security of electronic protected health information.