-
I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)
The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other m...30 Apr 2010
-
intelligence community
The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.30 Apr 2010
-
Fortezza
Fortezza, Italian for "fortress," is a family of security products trademarked by the US government's National Security Agency.30 Apr 2010
-
Defense Message System (DMS)
The Defense Message System (DMS) is a secure X.400-based e-mail system developed by the United States government in conjunction with industry partners to ensure safety for critical operations.30 Apr 2010
-
lifestyle polygraph
A lifestyle polygraph is a lie-detector (polygraph) test that is administered as a requirement for employment in certain fields.30 Apr 2010
-
HSPD-7 (Homeland Security Presidential Directive No. 7)
HSPD-7 (Homeland Security Presidential Directive No. 7) was a directive issued by U.S. President George W. Bush in December, 2003 that updated policies intended to protect the country from terroris...30 Apr 2010
-
CALEA (Communications Assistance for Law Enforcement Act)
CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information...30 Apr 2010
-
National Security Agency (NSA)
The National Security Agency (NSA) is the official U.S. cryptologic (the science of cryptographic design and decryption) organization.30 Apr 2010
-
national identity card
A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their ide...30 Apr 2010
-
National Computer Security Center (NCSC)
The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure ...30 Apr 2010
-
Tempest
Tempest was the name of a classified (secret) U.S. government project to study (probably for the purpose of both exploiting and guarding against) the susceptibility of some computer and telecommuni...30 Apr 2010
-
security clearance
A security clearance is an authorization that allows access to information that would otherwise be forbidden.30 Apr 2010
-
government Trojan
A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation. Government Trojans repre...30 Apr 2010
-
The real information security risk equation
A simplified information security risk equation helps translate information security risk to users.30 Apr 2010
-
Four steps toward a plan for a career in information security
Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.30 Apr 2010
-
Cybersecurity bill lacks details
The Rockefeller-Snowe cybersecurity bill has potential but raises a lot of questions.30 Apr 2010
-
Database activity monitoring keeps watch over your data
Database activity monitoring can help with security and compliance by tracking everything going on in the database.30 Apr 2010
-
How to be a Chief Information Security Officer (CISO)
If being a Chief Information Security Officer (CISO) is your dream job, this video is for you. Ernie Hayden, consultant and former CISO, gives advice on the essentials, including how to keep things...30 Apr 2010
-
Database activity monitoring keeps watch over your data 2
Database activity monitoring can help with security and compliance by tracking everything going on in the database.30 Apr 2010
-
Microsoft warns of serious SharePoint cross-site scripting zero-day
A cross-site scripting (XSS) flaw in SharePoint Server 2007 and SharePoint Services 3.0 could allow elevation of privilege within the SharePoint site itself, Microsoft said.30 Apr 2010
Security Management Strategies for the CIO