text
stringlengths 0
118
|
---|
role of data security law in, 194β95 |
Snapchat app, 81β82 |
risk management, 71β75, 194β95 |
RockYou company, 20 |
Rose, Pete, 140 |
RSA Security, 21 |
Sarver v. Experian, 97β98 |
Schneider, Fred, 76β77 |
Schneier, Bruce, 67, 86, 88, 177, 178 |
SEC (Securities and Exchange Commission), 51 |
security by design, 176β89, 197. See also human-centric security measures |
anticipating human problems, 185β86 |
balanced security measures, 182β83 |
changing default settings, 178β80 |
eliminating impossible security practices, 183β84 |
overview, 176β78 |
promoting mutual trust, 180β82 |
signals, 186β89 |
two-factor authentication, 184β85 |
security safeguards laws. See also data security law; HIPPA defined, 37 |
FIPPs, 47β48, 136 |
FISMA of 2002, 48 |
FTC Act, 50 |
Homeland Security Act, 48 |
ineffective enforcement of, 53β54 |
lack of compliance with, 52β53 |
origin of, 47β48 |
Privacy Act of 1974, 49β50 |
reasonableness approach to, 49β51 |
rigidity of, 52 |
standards approach to, 48β51 |
vagueness of, 51β52 |
Seven Basic Plots, The (Booker), 31 |
short-term thinking, pervasiveness of, 33 |
Shostack, Adam, 76β77 |
signals |
misleading, 186β87 |
overview, 186 |
timing and frequency of, 187β89 |
Silk Road, 21β22 |
SIM (subscriber identification module) card attacks, 65β67 |
Smith, Brad, 104 |
Snapchat app, 81β82 |
social security numbers (SSNs), 120β22, 126β27 |
software designers, 87β89 |
Sony Pictures data breach, 24β25, 150β53 |
spam filters, 188 |
spear phishing, 174 |
Spokeo, Inc. v. Robins, 58 |
Spotify, 85β86 |
spyware, 147β48 |
SSNs (social security numbers), 120β22, 126β27 |
Stamos, Alex, 144 |
standards approach, security safeguards laws, 48β51 |
Starwood hotel chain, 27 |
Strava app, 148 |
Stuxnet virus, 20 |
subscriber identification module (SIM) card attacks, 65β67 |
surveillance tools, 147β48 |
Target data breach, 1β4, 24 |
Citadel Trojan horse, 3 |
class action lawsuits, 8 |
Fazio Mechanical HVAC company, 3 |
FireEye software, 3, 4 |
lawsuit settlement, 54 |
regulatory penalties, 8 |
role of human error in, 3, 14 |
systemic vulnerabilities, 5 |
ZeuS malware package, 3 |
TD Ameritrade, 19 |
Thaw, David, 131β32 |
Thompson, Nicholas, 143β44 |
TJ Maxx, 19 |
TJX Companies, 109β10 |
βtragic choice,β 70 |
transaction costs, 177 |
Trojan horse, 3, 173 |
Twitter, 85β86, 158β59 |
two-factor authentication, 184β85 |
Uber, 27 |
Ulbricht, Ross, 21β22 |
underground markets for stolen data, 21β22 |
unilateral authentication, 105β6, 182 |
US-CERT (United States Computer Emergency Readiness Team), 93 |
vendors, role in data breaches, 31β32 |
Venmo, 178β79 |
viruses, 76 |
Waldman, Ari, 133β34 |
Walker, Jim, 3 |
WannaCry ransomware, 103β4 |
Warning Design Guidelines, 187β88 |
WikiLeaks, 26β27 |
Wiper (Wipall) malware, 150 |
Wolff, Josephine, 78, 109β10 |
Yahoo, 26 |
ZeuS malware package, 3 |
CHAPTER 1 |
INTRODUCTION |
CHAPTER OUTLINE |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.