1. Explain and contrast the five As of information security.
2. Explain the concept of sloppy code versus secure code as presented in the textbook, and give examples that illustrate each concept.
3. Assess why covered entities are required to obtain satisfactory assurances that business associates are appropriately safeguarding ePHI.
4. How would you respond to a small business owner who believes that his or her business is less likely to be attacked, precisely because it is so small?