Term
|
Definition
The ability that provides tracking of events. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The steps that ensure that the individual is who they claim to be. |
|
|
Term
|
Definition
The act of ensuring that an individual or element is genuine. |
|
|
Term
|
Definition
Security actions that ensure that data is accessible to authorized users. |
|
|
Term
California's Database Security Breach Act (SB-1386) |
|
Definition
Security Breach Notification Act The first state law that covers any state agency, person, or company that does business in California. |
|
|
Term
|
Definition
actions that ensure only authorized parties can view the information. |
|
|
Term
|
Definition
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. |
|
|
Term
|
Definition
A network of attackers, identity thieves, spammers, and financial fraudsters. |
|
|
Term
|
Definition
A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence. |
|
|
Term
|
Definition
Attackers whose motivation may be defined as ideology, or attacking for the sake of their principles or beliefs. |
|
|
Term
|
Definition
The act of taking advantage of a vulnerability. |
|
|
Term
Gramm-Leach-Bliley Act (GLBA) |
|
Definition
A law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. |
|
|
Term
|
Definition
A term used to refer to a person who uses advanced computer skills to attack computers. |
|
|
Term
Health Insurance Portability and Accountability Act (HIPAA) |
|
Definition
A law designed to guard protected health information and implement policies and procedures to safeguard it. |
|
|
Term
|
Definition
Stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain. |
|
|
Term
|
Definition
The tasks of securing information that is in a digital format. |
|
|
Term
|
Definition
actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data. |
|
|
Term
|
Definition
The likelihood that a threat agent will exploit the vulnerability. |
|
|
Term
Sarbanes-Oxley Act (Sarbox) |
|
Definition
A law designed to fight corporate corruption. |
|
|
Term
|
Definition
Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so. |
|
|
Term
|
Definition
A person who has been hired to break into a computer and steal information. |
|
|
Term
|
Definition
A type of action that has the potential to cause harm. |
|
|
Term
|
Definition
A person or element that has the power to carry out a threat. |
|
|
Term
|
Definition
A flaw or weakness that allows a threat agent to bypass security. |
|
|