Term
|
Definition
| An entity that has value. |
|
|
Term
|
Definition
| Ensures that data is accessible to authorized users. |
|
|
Term
| California Database Security Breath Act |
|
Definition
| A state act that requires disclosure to California residents if a breach of personal information has or is believed to have occurred. |
|
|
Term
| Childrens Online Privacy Protection Act (COPPA) |
|
Definition
| A U.S. federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a childs personal information. |
|
|
Term
|
Definition
| Ensures that only authorized parties can view the information. |
|
|
Term
|
Definition
| Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. |
|
|
Term
|
Definition
| A loose-knit network of attackers, identity thieves, and financial fraudsters that are more highly motivated, less risk-averse, better funded, and more tenacious than hackers. |
|
|
Term
|
Definition
| Attacks launched by cvberterrorists that could cripple a nations electronic and commercial infrastructure. |
|
|
Term
|
Definition
| An attacker motivated by ideology tto attack computers or infrastructure networks. |
|
|
Term
|
Definition
| To take advantage of a vulnerability. |
|
|
Term
| Gramm-Leach-Bliley Act (GLBA) |
|
Definition
| A U.S. federal act thet requires private data to be protected by banks and other financial institutions. |
|
|
Term
|
Definition
| (1) Anyone who illegally breaks into or attempts to break into a computer system; (2) A person who uses advanced computer skills to attack computers but not with malicious intent. |
|
|
Term
| Health Insurance Portability and Accountability Act (HIPAA) |
|
Definition
| A U.S. federal act that requires healthcare enterprises to guard protected health information. |
|
|
Term
|
Definition
| Using someones personal information, such as a Social Security number~ to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating. |
|
|
Term
| information assurance (IA) |
|
Definition
| A superset of information security including security issues that do not involve computers. |
|
|
Term
|
Definition
| The tasks of guarding information that is in a digital format. More specifically, that which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures. |
|
|
Term
|
Definition
| Ensures that the information is correct and no unauthorized person or malicious software has altered that data. |
|
|
Term
|
Definition
| The likelihood that a threat agent will exploit a vulnerability. |
|
|
Term
| Sarbanes-Oxley Act (Sarbox) |
|
Definition
| A U.S. federal act that enforces reporting requirements and internal controls on electronic financial reporting systems. |
|
|
Term
|
Definition
| An unskilled user who downloads automated attack software to attack computers. |
|
|
Term
|
Definition
| A method that identifies malware on a computer by matching it to an antivirus signature file. |
|
|
Term
|
Definition
| A person who has been hired to break into a computer and steal information. |
|
|
Term
|
Definition
| An event or action that may defeat the security measures in place and result in a loss. |
|
|
Term
|
Definition
| A person or thing that has the power to carry out a threat. |
|
|
Term
|
Definition
| A U.S. federal act that broadens the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism. |
|
|
Term
|
Definition
| A weakness that allows a threat agent to bypass security. |
|
|
Term
|
Definition
| An attack that occurs when an attacker discovers and exploits a previously unknown flaw, providing zero days of warning. |
|
|