Term
|
Definition
accounts for nearly 75% of all information security breaches in business today |
|
|
Term
|
Definition
Personally Identifiable Information |
|
|
Term
Graham-Leach Bliley Act of 1999 |
|
Definition
GLBA protect information from financial institutions
Req notice of sharing policies and give the consumer the right to "opt-out" of the institution sharing their information |
|
|
Term
|
Definition
The GLBA protexts against this social engineering attack its the use of fraudulent docs to get the consumer to release info |
|
|
Term
Telephone records and privacy protection act of 2006 |
|
Definition
Dunn pretended to be a company and got info. this act made it a federal crime for people to perform fraudulent tactics to get phone companies to release info |
|
|
Term
Health Insurance Portability and Accountability Act of 1996 |
|
Definition
HIPPA req. hospitals and doctors to provide safeguards over their patients information. Noncompliance fines up to 100,000 and 10yrs in jail |
|
|
Term
Sarbanes-Oxley Act of 2002 |
|
Definition
SOX - result of scandals at enron, world come etc. objective - corporate governance, and accurate financial disclosure Companies have to submit andannual assesment of their financial auditing reports to the (sec) security exchange commission |
|
|
Term
Security Exchange commission |
|
Definition
gets audit reports from companies because of SOX |
|
|
Term
Federal Info Management Act of 2002 |
|
Definition
ensure effectiveness of internet security government wide oversight of information security risk |
|
|
Term
Homeland Security Act of 2002 |
|
Definition
fed. responsibility to work ith the private sector, state and local gov and the public to protect the nations information |
|
|
Term
Security Breach Notification Act |
|
Definition
SB-1386 Ca's requirement for businesses to notify their customers if their personal information may have been exposed by and info sec.breach (persons name + SS#,DL#,or financial ACCT # |
|
|
Term
|
Definition
Sells information, gave fraud info of 163,000 people - 10million + 5million to settle the charges |
|
|
Term
Payment Card Industry Data Security Standards |
|
Definition
|
|
Term
The federal rules of civil procedure, rule 26 |
|
Definition
focuses on the discovery of electronic information rather than privacy info (keep records of employees emails and ims) |
|
|
Term
|
Definition
continuum of illicit activities that compromise of threaten the use of electronic info, is, and computer networks |
|
|
Term
|
Definition
Mimic tones, use whistle from captain crunch, steve jobs and wozniac |
|
|
Term
|
Definition
Malicious computer code that is software and intentionally designed to infiltrate or damage computer networks |
|
|
Term
|
Definition
Convinced users they were attacked and offered a remedy which was actually was the storm worm. |
|
|
Term
|
Definition
virus that propagates over network without user action to infect the computer |
|
|
Term
|
Definition
|
|
Term
|
Definition
Overloaded computer networks |
|
|
Term
|
Definition
Virus that presents itself as one program but is another |
|
|
Term
|
Definition
Example of the flashdrives |
|
|
Term
|
Definition
Program that establishes root access to a computer. similar to admin access - used to sustain computers injected with spyware |
|
|
Term
|
Definition
Network of computers that are all infected with a malware called a Bot |
|
|
Term
|
Definition
Individual computer in a botnet |
|
|
Term
|
Definition
Person controlling the botnet |
|
|
Term
|
Definition
attack people and their weakness |
|
|
Term
|
Definition
Might fill up the spaceandmakeacomputer unusable |
|
|
Term
Distributed Denial of service DDoS |
|
Definition
often carried out by zombies to attack a computer or network and overwhelm its resources |
|
|
Term
|
Definition
Relies on spoofed emails to get information - will link to a fake website |
|
|
Term
|
Definition
use dns cache to get the victims to a website and give their info |
|
|
Term
|
Definition
Change their banks ip address and change it to a bogus website |
|
|
Term
|
Definition
take control of dns server just by visiting the page (many say disable java script in browsers) |
|
|
Term
|
Definition
|
|
Term
|
Definition
exploits that take advantage of vulnerabilities only known to hackers |
|
|
Term
|
Definition
used to entice and watch how cyber criminals and their malware behave, disguised as a normal network |
|
|
Term
|
Definition
2 keys are required. info cannot be read by anyone but the receiver |
|
|
Term
|
Definition
Example is your signature on a check allowing it to be cashed. |
|
|
Term
|
Definition
Verify the identity of the person |
|
|
Term
|
Definition
ID someone based on physiological or behavioral traids like fingerprints and eyes |
|
|
Term
|
Definition
|
|
Term
|
Definition
plug into a computer, serial number and a shared secret |
|
|
Term
Network Address Translation |
|
Definition
used by firewalls to hide Ip addresses of LAN computers. |
|
|