Term
|
Definition
| An instructional approach for teaching adults. |
|
|
Term
|
Definition
| An e-mail message containing a false warning to the recipient of m malicious entity circulating through the Internet. |
|
|
Term
|
Definition
| The obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them. |
|
|
Term
|
Definition
| An investigation that will examine all material facts. |
|
|
Term
|
Definition
| The principle of treating all accused persons in an equal fashion using established rules and principles. |
|
|
Term
|
Definition
| Digging through trash receptacles to find computer manuals printouts or password lists that have been thrown away. |
|
|
Term
|
Definition
| A policy intended to be a central guide and reference for employees in support of day-to-day decision making. |
|
|
Term
|
Definition
| Phishing that involves phishers setting up their own search engines to direct traffic to illegitimate sites. |
|
|
Term
|
Definition
| A collection of suggestions that should be implemented. |
|
|
Term
|
Definition
| An instructional approach for teaching children. |
|
|
Term
|
Definition
| Phishing that automatically redirects the user to a fake site. |
|
|
Term
|
Definition
| An attack that sends an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. |
|
|
Term
|
Definition
| A document that outlines specific requirements or rules that must be met. |
|
|
Term
|
Definition
| The systematic and structured approach to managing the potential for loss that is related to a threat. |
|
|
Term
|
Definition
| A written document that states how an organization plans to protect the company's information technology assets. |
|
|
Term
|
Definition
| Watching an individual enter a security code or password on a keypad. |
|
|
Term
|
Definition
| An attack that relies on tricking and deception to provide secure information. |
|
|
Term
|
Definition
| Phishing that targets only specific users. |
|
|
Term
|
Definition
| A collection of requirements specific to the system or procedure that must be met by everyone. |
|
|