• Showing 51-100 of 427 items
  • <<
  • 1
  • 2
  • 3
  • ...
  • 9
  • >>
  1. Chief Security Officer - CSO

    The chief security officer is the executive in charge of the security of personnel, data, and physical assets.
  2. Health Insurance Portability and Accountability Act (HIPAA)

    Health Insurance Portabiilty and Accountability ACT (HIPAA) was an act created by the U.S Congress in 1996 to protect privacy ...
  3. Linkage

    Linkage is the ability to buy a security on one financial exchange and sell the same security on another exchange.
  4. Cyberslacking

    Cyberslacking refers to an employee’s use of work computers and other resources for personal matters during the work day.
  5. Economic Espionage

    Economic espionage is the unlawful targeting and theft of critical economic intelligence such as with trade secrets or intellectual ...
  6. Apple App Store

    The Apple App Store is a digital distribution platform where customers can buy and download digital software and applications.
  7. How to Keep Your Social Security Number Secure

    Data breaches are common. Here's how to help make sure your Social Security number doesn't get into the wrong hands.
  8. 7 Ways to Protect Against Credit Card Hacks

    If your credit card hasn't been hacked yet, it may just be a matter of time. Here's how to protect yourself as much as possible ...
  9. Who is Liable for Credit Card fraud?

    If your credit card is stolen in the US, federal law limits the liability of card holders to $50, regardless of the amount ...
  10. Identity Theft: What to Do, Who To Call

    If your identity is stolen, it's critical to act fast. Find out what to do if it happens and who to call.
  11. Financial Services Agency - FSA

    Financial Services Agency, or FSA, is a Japanese government entity responsible for overseeing banking, insurance and securities ...
  12. Stop Scams in Their Tracks

    Find out how to protect yourself and your loved ones from financial fraudsters.
  13. Doxing

    Doxing is the act of intentionally publishing someone’s private information or identity online without their permission. ...
  14. White Hat

    A white hat is an ethical practice used to improve computer and internet systems such as security and search engine optimization.
  15. Backdoor

    A backdoor is a way in which a third party can gain access to software or a computer system without authentication.
  16. Millennials at Higher Risk of Identity Theft

    Tech savvy Millenials are particularly prone to becoming a victim of identify theft.
  17. Mobile Banking

    Mobile banking is the act of making financial transactions on a mobile device (cell phone, tablet, etc.).
  18. How to Protect Your Data From Being Hacked

    Identity theft and credit card fraud can happen to anyone. Use these tips to help keep your personal information safe.
  19. Know the Latest IRS Scams

    How do IRS scammers go about stealing your personal information? Their methods include hacking, malicious software and psychological ...
  20. How Much Can Facebook Potentially Make from Selling Your Data?

    How much does Facebook stand to make by selling user data? Hard to be sure since they will never tell, but we try to extrapolate ...
  21. Delivery Versus Payment (DVP)

    Delivery versus payment is a securities industry settlement procedure in which the buyer's payment for securities is due ...
  22. Social Networking Service (SNS)

    A social networking service (SNS) is an online vehicle for creating relationships with other people who share an interest, ...
  23. Cambridge Analytica

    Cambridge Analytica is the firm that allegedly misused users' data from Facebook and other platforms to influence political ...
  24. Gray Box

    Gray box is the testing of software with limited knowledge of its internal workings.
  25. Intrusion Detection System (IDS)

    An Intrusion Detection System (IDS) is a computer program that detects security threats by monitoring the trail of activities ...
  26. Aggregation

    Aggregation is a principal involving the combination of all future positions owned or controlled by a single trader or group ...
  27. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack carried out on networks, websites and online resources to ...
  28. Online Banking

    Online banking is the performance of banking activities via the Internet.
  29. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive information by an individual, group, or software system.
  30. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, targeted attack on an organization’s computers to gather ...
  31. Hacktivism

    Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer ...
  32. Dark Web

    The dark web refers to encrypted online content that is not indexed on conventional search engines.
  33. HIPAA Waiver of Authorization

    A HIPAA waiver of authorization is a legal document that allows an individual’s health information to be used or disclosed ...
  34. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious software security weakness that the vendor or developer ...
  35. Hard Fork

    A hard fork (or sometimes hardfork) is a radical change to the protocol that makes previously invalid blocks/transactions ...
  36. Cloud Computing

    Cloud computing is a model for delivering information technology services; resources are retrieved from the internet through ...
  37. Accounting Information System - AIS

    An accounting information system is the collection, storage and processing of financial and accounting data that is used ...
  38. Errors And Omissions Insurance - E&O

    Errors and omissions insurance is a professional liability insurance that protects companies & individuals against claims ...
  39. Keyboard Logger

    A keyboard logger is hardware or software that records every keystroke on a computer, usually for nefarious purposes and ...
  40. Honeypot

    A honeypot is a security measure used to prevent and dismantle cyberattacks by luring attackers to a specific area of a computer ...
  41. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the area of computer security, then determining what steps to ...
  42. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict damage to a company by exploiting vulnerabilities in its ...
  43. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software to hold a user’s computer system hostage until a ransom ...
  44. Cloud Security

    Cloud security is the protection of data stored online from theft, leakage and deletion.
  45. Computer Abuse

    Computer abuse is the use of a computer to do something improper or illegal.
  46. Disaster Recovery Site

    A disaster recovery site, also known as a backup site, is a place that a company can temporarily relocate to following a ...
  47. Botnet

    A botnet is a network of internet-connected devices that have been compromised by hackers without the knowledge of the legitimate ...
  48. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic information private, ranging from personal protection to complex ...
  49. Bring Your Own Device (BYOD)

    Bring Your Own Device (BYOD) is a company policy that allows employees to use their personal mobile devices and laptops for ...
  50. Cloud Hijacking

    Cloud hijacking is the breaking into or taking over of the cloud account of an individual, business or other organization ...
  • Showing 51-100 of 427 items
  • <<
  • 1
  • 2
  • 3
  • ...
  • 9
  • >>
Trading Center