Term
|
Definition
An entity that has value. |
|
|
Term
|
Definition
Ensures that data is accessible to authorized users. |
|
|
Term
California Database Security Breath Act |
|
Definition
A state act that requires disclosure to California residents if a breach of personal information has or is believed to have occurred. |
|
|
Term
Childrens Online Privacy Protection Act (COPPA) |
|
Definition
A U.S. federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a childs personal information. |
|
|
Term
|
Definition
Ensures that only authorized parties can view the information. |
|
|
Term
|
Definition
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. |
|
|
Term
|
Definition
A loose-knit network of attackers, identity thieves, and financial fraudsters that are more highly motivated, less risk-averse, better funded, and more tenacious than hackers. |
|
|
Term
|
Definition
Attacks launched by cvberterrorists that could cripple a nations electronic and commercial infrastructure. |
|
|
Term
|
Definition
An attacker motivated by ideology tto attack computers or infrastructure networks. |
|
|
Term
|
Definition
To take advantage of a vulnerability. |
|
|
Term
Gramm-Leach-Bliley Act (GLBA) |
|
Definition
A U.S. federal act thet requires private data to be protected by banks and other financial institutions. |
|
|
Term
|
Definition
(1) Anyone who illegally breaks into or attempts to break into a computer system; (2) A person who uses advanced computer skills to attack computers but not with malicious intent. |
|
|
Term
Health Insurance Portability and Accountability Act (HIPAA) |
|
Definition
A U.S. federal act that requires healthcare enterprises to guard protected health information. |
|
|
Term
|
Definition
Using someones personal information, such as a Social Security number~ to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating. |
|
|
Term
information assurance (IA) |
|
Definition
A superset of information security including security issues that do not involve computers. |
|
|
Term
|
Definition
The tasks of guarding information that is in a digital format. More specifically, that which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures. |
|
|
Term
|
Definition
Ensures that the information is correct and no unauthorized person or malicious software has altered that data. |
|
|
Term
|
Definition
The likelihood that a threat agent will exploit a vulnerability. |
|
|
Term
Sarbanes-Oxley Act (Sarbox) |
|
Definition
A U.S. federal act that enforces reporting requirements and internal controls on electronic financial reporting systems. |
|
|
Term
|
Definition
An unskilled user who downloads automated attack software to attack computers. |
|
|
Term
|
Definition
A method that identifies malware on a computer by matching it to an antivirus signature file. |
|
|
Term
|
Definition
A person who has been hired to break into a computer and steal information. |
|
|
Term
|
Definition
An event or action that may defeat the security measures in place and result in a loss. |
|
|
Term
|
Definition
A person or thing that has the power to carry out a threat. |
|
|
Term
|
Definition
A U.S. federal act that broadens the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism. |
|
|
Term
|
Definition
A weakness that allows a threat agent to bypass security. |
|
|
Term
|
Definition
An attack that occurs when an attacker discovers and exploits a previously unknown flaw, providing zero days of warning. |
|
|