text
stringlengths 0
118
|
---|
KrebsOnSecurity, 84β85 |
default settings, changing, 178β80 |
Def Con, 107 |
Delilah malware, 154 |
Democratic Party data breach, 26β27 |
designers, 83β89 |
defined, 83 |
device designers, 84β87 |
overview, 83β84 |
software designers, 87β89 |
designing human-centric security. See human-centric security measures |
Destover (Wiper) malware, 150 |
device designers, 84β87 |
devices, role in data breaches, 32 |
digital technology exceptionalism, 106β9, 195 |
distributed denial-of-service attacks. See DDoS attacks |
distributors, 89β93 |
defined, 83 |
malvertising, 89β90 |
overview, 89 |
platforms, 90β93 |
Dixon, Pam, 114 |
Dorn VAMC data breach, 35β37 |
Dropbox, 23 |
DSW, 18β19 |
Electronic Questionnaires for Investigations Processing (e-QIP) system, 129 |
Eli Lilly, 50 |
email scams, 173β74 |
encryption, 33, 72, 101 |
backdoors to, 100β1 |
privacy vs., 133β34 |
Epsilon, 21 |
e-QIP (Electronic Questionnaires for Investigations Processing) system, 129 |
Equifax, 27, 54, 90, 93β95 |
EU (European Union) |
data protection, 132 |
e-Privacy directive, 20 |
GDPR, 9, 27, 40β41, 43, 45 |
Evernote, 104β5 |
Experian, 25β26, 97β98 |
exploiters, 83, 103β4 |
Facebook, 143β46 |
facilitators, 99β103 |
defined, 83 |
government entities, 100β3 |
overview, 99 |
Fair Credit Reporting Act (FCRA) of 1970, 96, 98β99, 123 |
Fair Information Practice Principles (FIPPs), 47β48, 136 |
Fazio Mechanical HVAC company, 3 |
FDIC (Federal Deposit Insurance Corporation), 45 |
Federal Communications Commission (FCC), 49β50 |
Federal Deposit Insurance Corporation (FDIC), 45 |
Federal Information Security Management Act (FISMA) of 2002, 48 |
Federal Trade Commission. See FTC |
financial identity theft, 113 |
fingerprint data, OPM, 129 |
FIPPs (Fair Information Practice Principles), 47β48, 136 |
FireEye software, 3, 4 |
FISMA (Federal Information Security Management Act) of 2002, 48 |
Ford, Roger, 173 |
Ford Pinto, 123β24 |
FTC (Federal Trade Commission), 9, 49β51, 193 |
action against Eli Lilly, 50 |
Facebook fine, 145 |
FTC Act, 50 |
Gramm-Leach-Bliley Act, 51 |
In the Matter of TJX Companies, Inc. (2008), 50β51 |
NIST Special Publication 800-53, 51 |
settlement with Equifax, 93β95 |
GDPR (General Data Protection Regulation), 9, 27, 40β41, 43, 45 |
GLBA (Gramm-Leach-Bliley Act) of 1999, 51, 126β27 |
government entities, 100β3 |
Gramm-Leach-Bliley Act (GLBA) of 1999, 51, 126β27 |
Gross, Ralph, 120 |
Ground Control program, 139β40 |
Grubman Shire Meiselas & Sacks, 155 |
gullibility problem, 173β75 |
defined, 160 |
email scams, 173β74 |
phishing scams, 174β75 |
spear phishing, 174 |
Trojan horse, 173 |
hacking, 140β42 |
failure of passwords, 164β67 |
Moneyball βhack,β 139β40 |
βhacktivism,β 20, 26β27 |
Hannaford Brothers, 19 |
harm from data breaches |
childrenβs identity theft, 115 |
costs to consumers, 117 |
costs to organizations, 116β17 |
credit monitoring, 122β23 |
criminal identity theft, 113β14 |
financial identity theft, 113 |
Identity Theft and Identity Theft and Assumption Deterrence Act (1998), 117β18 |
irresponsible issuers of credit, 123β26 |
lawβs facilitation of identity theft, 119β21 |
medical identity theft, 114β15 |
overview, 111β12 |
reducing, 126β27 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.