You are reviewing your privacy and security policies, procedures, training program, and so on and comparing them to the HIPAA and ARRA regulations. You are conducting a
a) Security audit
b) Risk assessment
c) Compliance review
d) Data breach analysis