Cybersecurity

  • Showing 1-50 of 403 items
  • 1
  • 2
  • 3
  • ...
  • 9
  • >>
  1. How to Protect Your Data from Cyber Criminals

    Cyber crimes are common and on the rise. Here are some ways to protect your online data.
  2. RAM Scraping Attack

    A RAM scraping attack is a type of malware intrusion of a point-of-sale computer that is designed to steal large pools of ...
  3. PCI Compliance

    Payment card industry (PCI) compliance represents the operational and technical standards businesses must follow to protect ...
  4. Chief Security Officer - CSO

    The chief security officer is the company executive responsible for the security of personnel, physical assets and information. ...
  5. Health Insurance Portability and Accountability Act (HIPAA)

    Health Insurance Portabiilty and Accountability ACT (HIPAA) was an act created by the U.S Congress in 1996 to protect privacy ...
  6. Linkage

    Linkage refers to the ability to buy a security on one financial exchange and sell the same security on another exchange. ...
  7. Cyberslacking

    Cyberslacking refers to an employee’s use of work computers and other resources during work hours for non-work-related purposes.
  8. Economic Espionage

    Economic espionage is the unlawful targeting and theft of critical economic intelligence such as with trade secrets or intellectual ...
  9. Apple App Store

    The Apple App Store is a digital distribution platform where customers can buy and download digital software and applications.
  10. How to Keep Your Social Security Number Secure

    Data breaches are common. Here's how to help make sure your Social Security number doesn't get into the wrong hands.
  11. 7 Ways to Protect Against Credit Card Hacks

    If your credit card hasn't been hacked yet, it may just be a matter of time. Here's how to protect yourself as much as possible ...
  12. Am I responsible for fraudulent charges on my credit card?

    Usually, no. U.S. federal law limits the liability of card holders to $50 regardless of the amount charged on the card by ...
  13. Identity Theft: Who To Call For Help

    If your identity is stolen, it's critical to act fast. Find out what to do if it happens.
  14. Financial Services Agency - FSA

    Financial Services Agency, or FSA, is a Japanese government entity responsible for overseeing banking, insurance and securities ...
  15. Stop Scams in Their Tracks

    Find out how to protect yourself and your loved ones from financial fraudsters.
  16. Doxing

    Doxing is the intentional act of publishing someone’s private, personal information or identity online without their permission. ...
  17. White Hat

    A white hat is an ethical, noncriminal practice used to improve computer and internet systems such as security and search ...
  18. Backdoor

    A backdoor is a way in which a third party can access software or a computer system without authentication in order to gain ...
  19. Millennials at Higher Risk of Identity Theft

    Tech savvy Millenials are particularly prone to becoming a victim of identify theft.
  20. Mobile Banking

    Mobile banking is the act of making financial transactions on a mobile device (cell phone, tablet, etc.).
  21. How to Protect Your Data From Being Hacked

    Identity theft and credit card fraud can happen to anyone. Use these tips to help keep your personal information safe.
  22. Know the Latest IRS Scams

    How do IRS scammers go about stealing your personal information? Their methods include hacking, malicious software and psychological ...
  23. How Much Can Facebook Potentially Make from Selling Your Data?

    How much does Facebook stand to make by selling user data? Hard to be sure since they will never tell, but we try to extrapolate ...
  24. Delivery Versus Payment (DVP)

    Delivery versus payment is a securities industry settlement procedure in which the buyer's payment for securities is due ...
  25. Social Networking Service (SNS)

    A social networking service (SNS) is an online vehicle for creating relationships with other people who share an interest, ...
  26. Cambridge Analytica

    Cambridge Analytica is the firm that allegedly misused users' data from Facebook and other platforms to influence political ...
  27. What's Stopping Blockchain from Mainstream Adoption?

    WSJ markets reporter Paul Vigna discusses what's stopping blockchain​​​​​​​ from catapulting into mainstream use.
  28. Gray Box

    Gray box is the testing of software with limited knowledge of its internal workings.
  29. Intrusion Detection System (IDS)

    An Intrusion Detection System (IDS) is a computer program that detects security threats by monitoring the trail of activities ...
  30. Aggregation

    Aggregation is a principal involving the combination of all future positions owned or controlled by a single trader or group ...
  31. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack carried out on networks, websites and online resources to ...
  32. WSJ's Vigna on Data Privacy & Facebook's Monopoly

    Beyond its uses for cryptocurrency, can blockchain help prevent unauthorized data mining and redistribution by decentralizing ...
  33. The DOL Fiduciary Rule Explained

    The Department of Labor (DOL) fiduciary rule expanded the “investment advice fiduciary” definition under the Employee Retirement ...
  34. Online Banking

    Online banking is the performance of banking activities via the Internet.
  35. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive information by an individual, group, or software system.
  36. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, targeted attack on an organization’s computers to gather ...
  37. Hacktivism

    Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer ...
  38. Dark Web

    The dark web refers to encrypted online content that is not indexed on conventional search engines.
  39. HIPAA Waiver of Authorization

    A HIPAA waiver of authorization is a legal document that allows an individual’s health information to be used or disclosed ...
  40. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious software security weakness that the vendor or developer ...
  41. Hard Fork

    A hard fork (or sometimes hardfork) is a radical change to the protocol that makes previously invalid blocks/transactions ...
  42. Cloud Computing

    Cloud computing is a model for delivering information technology services; resources are retrieved from the internet through ...
  43. Accounting Information System - AIS

    An accounting information system is the collection, storage and processing of financial and accounting data that is used ...
  44. Errors And Omissions Insurance - E&O

    Errors and omissions insurance is a professional liability insurance that protects companies & individuals against claims ...
  45. Keyboard Logger

    A keyboard logger is hardware or software that records every keystroke on a computer, usually for nefarious purposes and ...
  46. Honeypot

    A honeypot is a security measure used to prevent and dismantle cyberattacks by luring attackers to a specific area of a computer ...
  47. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the area of computer security, then determining what steps to ...
  48. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict damage to a company by exploiting vulnerabilities in its ...
  49. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software to hold a user’s computer system hostage until a ransom ...
  50. Cloud Security

    Cloud security is the protection of data stored online from theft, leakage and deletion.
  • Showing 1-50 of 403 items
  • 1
  • 2
  • 3
  • ...
  • 9
  • >>
Hot Definitions
  1. Inflation

    Inflation is the rate at which prices for goods and services is rising and the worth of currency is dropping.
  2. Discount Rate

    Discount rate is the interest rate charged to commercial banks and other depository institutions for loans received from ...
  3. Economies of Scale

    Economies of scale refer to reduced costs per unit that arise from increased total output of a product. For example, a larger ...
  4. Quick Ratio

    The quick ratio measures a company’s ability to meet its short-term obligations with its most liquid assets.
  5. Leverage

    Leverage results from using borrowed capital as a source of funding when investing to expand the firm's asset base and generate ...
  6. Financial Risk

    Financial risk is the possibility that shareholders will lose money when investing in a company if its cash flow fails to ...
Trading Center