Term
|
Definition
| The ability that provides tracking of events. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The act of ensuring that an individual or element is genuine. |
|
|
Term
|
Definition
| The steps that ensure that the individual is who they claim to be. |
|
|
Term
|
Definition
| Security actions that ensure that data is accessible to authorized users. |
|
|
Term
| Californias Database Security Breach Notification Act |
|
Definition
| The first state law that covers any state agency, person, or company that does business in California. |
|
|
Term
|
Definition
| Security actions that ensure only authorized parties can view the information. |
|
|
Term
|
Definition
| Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. |
|
|
Term
|
Definition
| A network of attackers, identity thieves, spammers, and financial fraudsters. |
|
|
Term
|
Definition
| A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence. |
|
|
Term
|
Definition
| Attackers whose motivation may be defined as ideology, or attacking for the sake of their principles or beliefs. |
|
|
Term
|
Definition
| The act of taking advantage of a vulnerability. |
|
|
Term
| Gramm-Leach-Bliley Act (GLBA) |
|
Definition
| A law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. |
|
|
Term
|
Definition
| A term used to refer to a person who uses advanced computer skills to attack computers. |
|
|
Term
| Health Insurance Portability and Accountability Act (HIPAA) |
|
Definition
| A law designed to guard protected health information and implement policies and procedures to safeguard it. |
|
|
Term
|
Definition
| Stealing another persons personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain. |
|
|
Term
|
Definition
| The tasks of securing information that is in a digital format. |
|
|
Term
|
Definition
| Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data. |
|
|
Term
|
Definition
| The likelihood that a threat agent will exploit the vulnerability. |
|
|
Term
| Sarbanes-Oxley Act (Sarbox) |
|
Definition
| A law designed to fight corporate corruption. |
|
|
Term
|
Definition
| Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so. |
|
|
Term
|
Definition
| A person who has been hired to break into a computer and steal information. |
|
|
Term
|
Definition
| A type of action that has the potential to cause harm. |
|
|
Term
|
Definition
| A flaw or weakness that allows a threat agent to bypass security. |
|
|