IT Security
-
Smart Cards
Smart Cards are generally used for access control and security purposes. The card itself usually contains a small amount of…
Read More » -
Wi-Fi Encryption
Wi-Fi Encryption requires a short discussion of its own. In such an environment, the clients and the access point share…
Read More » -
How to Stop a Virus or Worm That Is Out of Control
How to Stop a Virus or Worm that is Out of Control: A large private university has over 30,000 students…
Read More » -
Pretty Good Privacy
Pretty Good Privacy (PGP) is a freeware email encryption system. PGP was introduced in the early 1990s, and it’s considered…
Read More » -
The Patriot Act
The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001…
Read More » -
The Computer Security Act of 1987
The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires…
Read More » -
The Cyberspace Electronic Security Act
The Cyberspace Electronic Security Act (CESA) was passed in 1999, and it gives law enforcement the right to gain access…
Read More » -
The Family Educational Rights and Privacy Act
The Family Educational Rights and Privacy Act (FERPA) dictates that educational institutions may not release information to unauthorized parties without…
Read More » -
The Computer Fraud and Abuse Act
The Computer Fraud and Abuse Act (CFAA) went into a law in 1986. The original law as introduced to address…
Read More » -
The Gramm-Leach-Bliley Act
The Gram-Leach-Bliley Act, also known as the Financial Modernization Act of 1999, requires financial institutions to develop privacy notices and…
Read More »