Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Cyber-security regulation

Index Cyber-security regulation

A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. [1]

91 relations: Administrative Procedure Act (United States), American Civil Liberties Union, Antivirus software, Bank regulation, Barack Obama, Brexit, Bruce Schneier, California, California State Legislature, CERT Coordination Center, Chief executive officer, Computer, Computer security, Computer virus, Computer worm, Credit card, Critical infrastructure protection, Cyber Intelligence Sharing and Protection Act, Cyber security standards, Cyberattack, Cybersecurity Information Sharing Act, Data breach, Data Quality Act, Default password, Democratic Party (United States), Denial-of-service attack, E-commerce, Economic collapse, Electrical grid, Electronic Frontier Foundation, Encryption, EPrivacy Regulation (European Union), European Union, European Union Agency for Network and Information Security, Federal government of the United States, Federal Information Security Management Act of 2002, Firewall (computing), General Data Protection Regulation, George W. Bush, Gramm–Leach–Bliley Act, Health Insurance Portability and Accountability Act, Homeland Security Act, Indian Space Research Organisation, Information technology, Information Technology Association of America, International Organization for Standardization, International Telecommunication Union, Internet service provider, Intrusion detection system, Janet Napolitano, ..., Joe Lieberman, John McCain, John O. Brennan, Kay Bailey Hutchison, Leon Panetta, List of data breaches, Lobbying, Medical device hijack, National Cyber Security Division, National Strategy to Secure Cyberspace, Office of Management and Budget, Password, Personally identifiable information, Phishing, Power outage, Presidency of Barack Obama, Presidential directive, Proactive cyber defence, Resilient control systems, Richard A. Clarke, Rick Boucher, RSA Conference, Rulemaking, Social Security number, Spyware, Supreme Court of India, Susan Collins, TechNet (lobbying organization), The Heritage Foundation, The New York Times, Trojan horse (computing), Twitter, United States Chamber of Commerce, United States Computer Emergency Readiness Team, United States Congress, United States Department of Energy, United States Department of Homeland Security, United States House of Representatives, United States Senate, Virginia, White House. Expand index (41 more) »

Administrative Procedure Act (United States)

The Administrative Procedure Act (APA),, is the United States federal statute that governs the way in which administrative agencies of the federal government of the United States may propose and establish regulations.

New!!: Cyber-security regulation and Administrative Procedure Act (United States) · See more »

American Civil Liberties Union

The American Civil Liberties Union (ACLU) is a nonprofit organization whose stated mission is "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States." Officially nonpartisan, the organization has been supported and criticized by liberal and conservative organizations alike.

New!!: Cyber-security regulation and American Civil Liberties Union · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Cyber-security regulation and Antivirus software · See more »

Bank regulation

Bank regulation is a form of government regulation which subjects banks to certain requirements, restrictions and guidelines, designed to create market transparency between banking institutions and the individuals and corporations with whom they conduct business, among other things.

New!!: Cyber-security regulation and Bank regulation · See more »

Barack Obama

Barack Hussein Obama II (born August 4, 1961) is an American politician who served as the 44th President of the United States from January 20, 2009, to January 20, 2017.

New!!: Cyber-security regulation and Barack Obama · See more »

Brexit

Brexit is the impending withdrawal of the United Kingdom (UK) from the European Union (EU).

New!!: Cyber-security regulation and Brexit · See more »

Bruce Schneier

Bruce Schneier (born January 15, 1963, is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization.

New!!: Cyber-security regulation and Bruce Schneier · See more »

California

California is a state in the Pacific Region of the United States.

New!!: Cyber-security regulation and California · See more »

California State Legislature

The California State Legislature is the state legislature of the U.S. state of California.

New!!: Cyber-security regulation and California State Legislature · See more »

CERT Coordination Center

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.

New!!: Cyber-security regulation and CERT Coordination Center · See more »

Chief executive officer

Chief executive officer (CEO) is the position of the most senior corporate officer, executive, administrator, or other leader in charge of managing an organization especially an independent legal entity such as a company or nonprofit institution.

New!!: Cyber-security regulation and Chief executive officer · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Cyber-security regulation and Computer · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Cyber-security regulation and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Cyber-security regulation and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Cyber-security regulation and Computer worm · See more »

Credit card

A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts so paid plus the other agreed charges.

New!!: Cyber-security regulation and Credit card · See more »

Critical infrastructure protection

Critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or nation.

New!!: Cyber-security regulation and Critical infrastructure protection · See more »

Cyber Intelligence Sharing and Protection Act

The Cyber Intelligence Sharing and Protection Act (CISPA (112th Congress), (113th Congress), (114th Congress)) was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.

New!!: Cyber-security regulation and Cyber Intelligence Sharing and Protection Act · See more »

Cyber security standards

Cybersecurity standards (also styled cyber security standards) are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.

New!!: Cyber-security regulation and Cyber security standards · See more »

Cyberattack

A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Cyber-security regulation and Cyberattack · See more »

Cybersecurity Information Sharing Act

The Cybersecurity Information Sharing Act (CISA) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes".

New!!: Cyber-security regulation and Cybersecurity Information Sharing Act · See more »

Data breach

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

New!!: Cyber-security regulation and Data breach · See more »

Data Quality Act

The Data Quality Act (DQA) or Information Quality Act (IQA), passed through the United States Congress in Section 515 of the Consolidated Appropriations Act, 2001.

New!!: Cyber-security regulation and Data Quality Act · See more »

Default password

Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup, or after resetting to factory defaults.

New!!: Cyber-security regulation and Default password · See more »

Democratic Party (United States)

The Democratic Party is one of the two major contemporary political parties in the United States, along with the Republican Party (nicknamed the GOP for Grand Old Party).

New!!: Cyber-security regulation and Democratic Party (United States) · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Cyber-security regulation and Denial-of-service attack · See more »

E-commerce

E-commerce is the activity of buying or selling of products on online services or over the Internet.

New!!: Cyber-security regulation and E-commerce · See more »

Economic collapse

Economic collapse is any of a broad range of bad economic conditions, ranging from a severe, prolonged depression with high bankruptcy rates and high unemployment (such as the Great Depression of the 1930s), to a breakdown in normal commerce caused by hyperinflation (such as in Weimar Germany in the 1920s), or even an economically caused sharp rise in the death rate and perhaps even a decline in population (such as in countries of the former USSR in the 1990s).

New!!: Cyber-security regulation and Economic collapse · See more »

Electrical grid

An electrical grid is an interconnected network for delivering electricity from producers to consumers.

New!!: Cyber-security regulation and Electrical grid · See more »

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California.

New!!: Cyber-security regulation and Electronic Frontier Foundation · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Cyber-security regulation and Encryption · See more »

EPrivacy Regulation (European Union)

The ePrivacy Regulation (ePR) is a proposal for a Regulation on Privacy and Electronic Communications.

New!!: Cyber-security regulation and EPrivacy Regulation (European Union) · See more »

European Union

The European Union (EU) is a political and economic union of EUnum member states that are located primarily in Europe.

New!!: Cyber-security regulation and European Union · See more »

European Union Agency for Network and Information Security

The European Union Agency for Network and Information Security - self-designation ENISA from the abbreviation of its original name - is an agency of the European Union.

New!!: Cyber-security regulation and European Union Agency for Network and Information Security · See more »

Federal government of the United States

The federal government of the United States (U.S. federal government) is the national government of the United States, a constitutional republic in North America, composed of 50 states, one district, Washington, D.C. (the nation's capital), and several territories.

New!!: Cyber-security regulation and Federal government of the United States · See more »

Federal Information Security Management Act of 2002

The Federal Information Security Management Act of 2002 ("FISMA",, et seq.) is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002. The act recognized the importance of information security to the economic and national security interests of the United States.

New!!: Cyber-security regulation and Federal Information Security Management Act of 2002 · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Cyber-security regulation and Firewall (computing) · See more »

General Data Protection Regulation

The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).

New!!: Cyber-security regulation and General Data Protection Regulation · See more »

George W. Bush

George Walker Bush (born July 6, 1946) is an American politician who served as the 43rd President of the United States from 2001 to 2009.

New!!: Cyber-security regulation and George W. Bush · See more »

Gramm–Leach–Bliley Act

The Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, is an act of the 106th United States Congress (1999–2001).

New!!: Cyber-security regulation and Gramm–Leach–Bliley Act · See more »

Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996.

New!!: Cyber-security regulation and Health Insurance Portability and Accountability Act · See more »

Homeland Security Act

The Homeland Security Act (HSA) of 2002, was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores.

New!!: Cyber-security regulation and Homeland Security Act · See more »

Indian Space Research Organisation

The Indian Space Research Organisation (ISRO) is the space agency of the Government of India headquartered in the city of Bangalore.

New!!: Cyber-security regulation and Indian Space Research Organisation · See more »

Information technology

Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.

New!!: Cyber-security regulation and Information technology · See more »

Information Technology Association of America

The Information Technology Association of America (ITAA), formerly the Association of Data Processing Service Organizations (ADAPSO), was a leading industry trade group for information technology companies.

New!!: Cyber-security regulation and Information Technology Association of America · See more »

International Organization for Standardization

The International Organization for Standardization (ISO) is an international standard-setting body composed of representatives from various national standards organizations.

New!!: Cyber-security regulation and International Organization for Standardization · See more »

International Telecommunication Union

The International Telecommunication Union (ITU; Union Internationale des Télécommunications (UIT)), originally the International Telegraph Union (Union Télégraphique Internationale), is a specialized agency of the United Nations (UN) that is responsible for issues that concern information and communication technologies.

New!!: Cyber-security regulation and International Telecommunication Union · See more »

Internet service provider

An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet.

New!!: Cyber-security regulation and Internet service provider · See more »

Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

New!!: Cyber-security regulation and Intrusion detection system · See more »

Janet Napolitano

Janet Ann Napolitano (born November 29, 1957) is an American politician, lawyer, and university administrator who served as the 21st Governor of Arizona from 2003 to 2009 and United States Secretary of Homeland Security from 2009 to 2013, under President Barack Obama.

New!!: Cyber-security regulation and Janet Napolitano · See more »

Joe Lieberman

Joseph Isadore Lieberman (born February 24, 1942) is an American politician and attorney who was a United States Senator for Connecticut from 1989 to 2013.

New!!: Cyber-security regulation and Joe Lieberman · See more »

John McCain

John Sidney McCain III (born August 29, 1936) is an American politician serving as the senior United States Senator from Arizona, a seat he was first elected to in 1986.

New!!: Cyber-security regulation and John McCain · See more »

John O. Brennan

John Owen Brennan (born September 22, 1955) was the Director of the Central Intelligence Agency (CIA) from March 2013 to January 2017.

New!!: Cyber-security regulation and John O. Brennan · See more »

Kay Bailey Hutchison

Kay Bailey Hutchison (born Kathryn Ann Bailey; July 22, 1943) is an American lawyer, businesswoman, politician, and diplomat who is currently serving as the 22nd United States Permanent Representative to NATO.

New!!: Cyber-security regulation and Kay Bailey Hutchison · See more »

Leon Panetta

Leon Edward Panetta (born June 28, 1938) is an American politician who has served in several different public office positions, such as Secretary of Defense, Director of the CIA, White House Chief of Staff, Director of the Office of Management and Budget, and as a U.S. Representative from California.

New!!: Cyber-security regulation and Leon Panetta · See more »

List of data breaches

This is a list of data breaches, using data compiled from various sources, including press reports, government news releases and mainstream news articles.

New!!: Cyber-security regulation and List of data breaches · See more »

Lobbying

Lobbying, persuasion, or interest representation is the act of attempting to influence the actions, policies, or decisions of officials in their daily life, most often legislators or members of regulatory agencies.

New!!: Cyber-security regulation and Lobbying · See more »

Medical device hijack

A medical device hijack (also called MEDJACK) is a type of cyber attack.

New!!: Cyber-security regulation and Medical device hijack · See more »

National Cyber Security Division

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Directorate for National Protection and Programs.

New!!: Cyber-security regulation and National Cyber Security Division · See more »

National Strategy to Secure Cyberspace

In the United States government, the National Strategy to Secure Cyberspace, is a component of the larger National Strategy for Homeland Security.

New!!: Cyber-security regulation and National Strategy to Secure Cyberspace · See more »

Office of Management and Budget

The Office of Management and Budget (OMB) is the largest office within the Executive Office of the President of the United States (EOP).

New!!: Cyber-security regulation and Office of Management and Budget · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Cyber-security regulation and Password · See more »

Personally identifiable information

Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

New!!: Cyber-security regulation and Personally identifiable information · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Cyber-security regulation and Phishing · See more »

Power outage

A power outage (also called a power cut, a power out, a power blackout, power failure or a blackout) is a short-term or a long-term loss of the electric power to a particular area.

New!!: Cyber-security regulation and Power outage · See more »

Presidency of Barack Obama

The presidency of Barack Obama began at noon EST on January 20, 2009, when Barack Obama was inaugurated as 44th President of the United States, and ended on January 20, 2017.

New!!: Cyber-security regulation and Presidency of Barack Obama · See more »

Presidential directive

A Presidential directive, or executive action, is a written or oral instruction or declaration issued by the President of the United States, which may draw upon the powers vested in the president by the U.S. Constitution, statutory law, or, in certain cases, congressional and judicial acquiescence.

New!!: Cyber-security regulation and Presidential directive · See more »

Proactive cyber defence

Proactive cyber defense or active cyber defense (ACD) means acting in anticipation to oppose an attack involving computers and networks.

New!!: Cyber-security regulation and Proactive cyber defence · See more »

Resilient control systems

In our modern society, computerized or digital control systems have been used to reliably automate many of the industrial operations that we take for granted, from the power plant to the automobiles we drive.

New!!: Cyber-security regulation and Resilient control systems · See more »

Richard A. Clarke

Richard Alan Clarke (born October 27, 1950) is the former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States.

New!!: Cyber-security regulation and Richard A. Clarke · See more »

Rick Boucher

Frederick Carlyle Boucher (born August 1, 1946) is an American politician who was the U.S. Representative for from 1983 to 2011.

New!!: Cyber-security regulation and Rick Boucher · See more »

RSA Conference

The RSA Conference is a series of IT security conferences.

New!!: Cyber-security regulation and RSA Conference · See more »

Rulemaking

In administrative law, rule-making is the process that executive and independent agencies use to create, or promulgate, regulations.

New!!: Cyber-security regulation and Rulemaking · See more »

Social Security number

In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as.

New!!: Cyber-security regulation and Social Security number · See more »

Spyware

Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Cyber-security regulation and Spyware · See more »

Supreme Court of India

The Supreme Court of India is the highest judicial forum and final court of appeal under the Constitution of India, the highest constitutional court, with the power of constitutional review.

New!!: Cyber-security regulation and Supreme Court of India · See more »

Susan Collins

Susan Margaret Collins (born December 7, 1952) is an American politician serving as the senior United States Senator from Maine, a seat she was first elected to in 1996.

New!!: Cyber-security regulation and Susan Collins · See more »

TechNet (lobbying organization)

TechNet is a United States political lobbying organization which represents public policy interests for technology issues.

New!!: Cyber-security regulation and TechNet (lobbying organization) · See more »

The Heritage Foundation

The Heritage Foundation (abbreviated to Heritage) is an American conservative public policy think tank based in Washington, D.C. The foundation took a leading role in the conservative movement during the presidency of Ronald Reagan, whose policies were taken from Heritage's policy study Mandate for Leadership.

New!!: Cyber-security regulation and The Heritage Foundation · See more »

The New York Times

The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.

New!!: Cyber-security regulation and The New York Times · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Cyber-security regulation and Trojan horse (computing) · See more »

Twitter

Twitter is an online news and social networking service on which users post and interact with messages known as "tweets".

New!!: Cyber-security regulation and Twitter · See more »

United States Chamber of Commerce

The United States Chamber of Commerce (USCC) is a business-oriented American lobbying group.

New!!: Cyber-security regulation and United States Chamber of Commerce · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Cyber-security regulation and United States Computer Emergency Readiness Team · See more »

United States Congress

The United States Congress is the bicameral legislature of the Federal government of the United States.

New!!: Cyber-security regulation and United States Congress · See more »

United States Department of Energy

The United States Department of Energy (DOE) is a cabinet-level department of the United States Government concerned with the United States' policies regarding energy and safety in handling nuclear material.

New!!: Cyber-security regulation and United States Department of Energy · See more »

United States Department of Homeland Security

The United States Department of Homeland Security (DHS) is a cabinet department of the United States federal government with responsibilities in public security, roughly comparable to the interior or home ministries of other countries.

New!!: Cyber-security regulation and United States Department of Homeland Security · See more »

United States House of Representatives

The United States House of Representatives is the lower chamber of the United States Congress, the Senate being the upper chamber.

New!!: Cyber-security regulation and United States House of Representatives · See more »

United States Senate

The United States Senate is the upper chamber of the United States Congress, which along with the United States House of Representatives—the lower chamber—comprise the legislature of the United States.

New!!: Cyber-security regulation and United States Senate · See more »

Virginia

Virginia (officially the Commonwealth of Virginia) is a state in the Southeastern and Mid-Atlantic regions of the United States located between the Atlantic Coast and the Appalachian Mountains.

New!!: Cyber-security regulation and Virginia · See more »

White House

The White House is the official residence and workplace of the President of the United States.

New!!: Cyber-security regulation and White House · See more »

Redirects here:

Cybersecurity Policy, NIS Directive, NIS directive.

References

[1] https://en.wikipedia.org/wiki/Cyber-security_regulation

OutgoingIncoming
Hey! We are on Facebook now! »