Security+
-
The Computer Fraud and Abuse Act
The Computer Fraud and Abuse Act (CFAA) went into a law in 1986. The original law as introduced to address…
Read More » -
The Gramm-Leach-Bliley Act
The Gram-Leach-Bliley Act, also known as the Financial Modernization Act of 1999, requires financial institutions to develop privacy notices and…
Read More » -
The Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act (HIPAA): is a regulation that mandates national standards and procedures for the storage,…
Read More » -
ACL: Access Control Lists
Access Control Lists: Related to permissions is the concept of the access control lists (ACL). An ACL is literally a…
Read More » -
Malicious Insider Threats
Malicious Insider Threats: One of the most dangerous threats to any network is an insider who is intent on doing…
Read More » -
Managing Spam to Avoid Viruses
Managing Spam to Avoid Viruses: Although spam is not truly a virus or a hoax, it is one of the…
Read More » -
How Viruses Work
How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or…
Read More » -
Finding the IP address of a Website
Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website…
Read More »