Musings
-
HIPAA Simplified {Part 2 – Definitions & Lexicons}
Authorization A Covered Entity (CE) is not allowed to share or disclose Protected Health Information (PHI) for reasons other than those specifically allowed by the HIPAA Privacy Rule.…
4 min read
-
HIPAA Simplified {Part 3 – HITECH Act, HIPAA Regulatory, Omnibus, Privacy, & Security Rule}
The HITECH Act HITECH is an acronym for Health Information Technology for Economic & Clinical Health. How is HITECH Act related to HIPAA? The HITECH Act is a…
4 min read
-
Try Hack Me – Advent of Cyber 3 – Day 1 – IDOR
What is an IDOR vulnerability? IDOR stands for Insecure Direct Object Reference and is a type of access control vulnerability. An access control vulnerability is when an attacker…
4 min read
-
Try Hack Me – Advent of Cyber 3 – Day 2 – Cookies
HTTP(S) For your computer and a webserver to communicate with each other, an intermediary protocol is required. This is where the HTTP (Hypertext Transfer Protocol) is introduced! The HTTP protocol…
4 min read
-
Try Hack Me – Advent of Cyber 3 – Day 3 – Content Discovery
Content Discovery Content discovery allows us to find things that we aren’t supposed to see. For example, we may be able to find the following by traversing the…
4 min read