13 relations: Cyberattack, Gramm–Leach–Bliley Act, Health Insurance Portability and Accountability Act, Heuristic, Industrial espionage, Malware, Phishing, Sarbanes–Oxley Act, Spamming, Threat (computer), Trojan Horse, Vulnerability (computing), Zero-day (computing).
A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.
New!!: Targeted threat and Cyberattack ·
The Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, is an act of the 106th United States Congress (1999–2001).
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996.
A heuristic technique (εὑρίσκω, "find" or "discover"), often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method, not guaranteed to be optimal, perfect, logical, or rational, but instead sufficient for reaching an immediate goal.
New!!: Targeted threat and Heuristic ·
Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.
New!!: Targeted threat and Malware ·
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
New!!: Targeted threat and Phishing ·
The Sarbanes–Oxley Act of 2002, also known as the "Public Company Accounting Reform and Investor Protection Act" (in the Senate) and "Corporate and Auditing Accountability, Responsibility, and Transparency Act" (in the House) and more commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal law that set new or expanded requirements for all U.S. public company boards, management and public accounting firms.
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.
New!!: Targeted threat and Spamming ·
In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war.
New!!: Targeted threat and Trojan Horse ·
In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).