Home / IT Security / Security+ (page 3)

Security+

Wi-Fi Encryption

Wi-Fi Encryption

Wi-Fi Encryption requires a short discussion of its own. In such an environment, the clients and the access point share the same key, using symmetric encryption, and RC4 was mentioned for this purpose earlier in articles. Since all the clients and the access point share the same key, this is …

Read More »

Pretty Good Privacy

Pretty Good Privacy

Pretty Good Privacy (PGP) is a freeware email encryption system. PGP was introduced in the early 1990s, and it’s considered to be a very good system. It’s widely used for email security. PGP uses both symmetrical and asymmetrical systems as a part of its process; it is this serial combination …

Read More »

The Patriot Act

The Patriot Act

The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 was passed largely because of the World Trade Center attack on September 11, 2001. This law gives the U.S government extreme latitude in pursuing criminals who commit terrorist acts. The …

Read More »

The Computer Security Act of 1987

The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires agencies that keep sensitive information to conduct regular training and audits and to implement procedures to protect privacy. All federal agencies must comply with this act. Note: For more information …

Read More »

The Cyberspace Electronic Security Act

The Cyberspace Electronic Security Act

The Cyberspace Electronic Security Act (CESA) was passed in 1999, and it gives law enforcement the right to gain access to encryption keys and cryptography methods. The initial version of this act allowed federal law enforcement agencies to secretly use monitoring, electronic capturing equipment, and other technologies to access and …

Read More »

The Family Educational Rights and Privacy Act

The Family Educational Rights and Privacy Act

The Family Educational Rights and Privacy Act (FERPA) dictates that educational institutions may not release information to unauthorized parties without the express permission of the student or, in the case of a minor, the parents of the student. This act also requires that educational institutions must disclose any records kept …

Read More »

The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (CFAA) went into a law in 1986. The original law as introduced to address issues of fraud and abuse that weren’t well covered under existing statues. The law was updated inn 1994, in 1996, and again in 2001. This act gives federal authorities, primarily …

Read More »

The Gramm-Leach-Bliley Act

The Gramm-Leach-Bliley Act

The Gram-Leach-Bliley Act, also known as the Financial Modernization Act of 1999, requires financial institutions to develop privacy notices and to notify customers that they are entitled to privacy. The act prohibits banks from releasing information to nonaffiliated third parties without permission. Many customers groups have criticized the implementation of …

Read More »

The Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act (HIPAA): is a regulation that mandates national standards and procedures for the storage, use, and transmission of personal medical information. Passed into law in 1996, HIPAA has caused a great deal of change in healthcare recordkeeping. HIPAA covers three areas—confidentiality, privacy, and the …

Read More »

Cookies and Attachments

Cookies and Attachments

Cookies and Attachments: Cookies are texts files that a browser maintains on the user’s hard disk in order to provide a persistent, customized web experience for each visit. A cookie typically contains information about the user. For example, a cookie can contain a client’s history to improve customer services. If …

Read More »