Study: IP theft takes months, years to detect

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Watching the watchers

    In this Security School lesson, expert Andreas explores how to monitor the activities of your most trusted insiders with a combination of policy, process and technology to keep unauthorized access and data loss to a minimum. 

  • Mass 201 CMR 17: Basics for security practitioners

    Massachusetts data protection law 201 CMR 17 went into effect on March 1, 2010. Get an in-depth look at the requirements of this law, and find out what needs to be done to become compliant with the law. 

  • Quiz: Data loss prevention

    Take this five-question quiz to test your knowledge of Rich Mogull's data loss prevention material. 

  • More from SearchSecurity.com -- May 2007

    Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information. 

  • Database defenses for a new era of threats

    All too often, precious corporate databases containing customer records and other sensitive data are forgotten or ignored. This lesson offers an overview of the basic tools needed to secure a company's databases against today's emerging and most dang... 

  • Balancing the cost and benefits of countermeasures

    The final tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage published by ... 

  • Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by R... 

  • Policies and regulatory compliance

    An overview of the type of policies needed for regulatory compliance. 

  • More from SearchSecurity -- April 2006

    Highlights from this month's issue of Information Security magazine. 

  • Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. 

  • See More: Essential Knowledge on Identity Theft and Data Security Breaches
  • targeted attack

    A targeted attack is one that seeks to breach the security measures of a specific individual or organization. Usually the initial attack is conducted to gain access to a computer or network and is followed by a further exploit designed to cause harm ... 

  • industrial espionage

    Industrial espionage is the covert and sometimes illegal practice of investigating competitors, usually to gain a business advantage. 

  • pretexting

    Pretexting is a form of social engineering in which one individual lies to obtain privileged data about another individual in order to engage in identity theft or corporate espionage. A pretext is a false motive. 

  • parameter tampering

    Parameter tampering is a form of Web-based hacking event (called an attack) in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization... (Continued) 

  • privilege escalation attack

    A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. 

  • bot worm

    A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that ... 

  • data breach

    A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable ... 

  • identity theft

    According to the Identity Theft Resource Center, identity theft is a crime in which an imposter obtains key pieces of personal information, such as a Social Security number, to impersonate someone else....(Continued) 

  • extrusion prevention

    Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. Extrusion prevention protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusio... 

  • CISP-PCI (Cardholder Information Security Program - Payment Card Industry Data Security Standard)

    CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.... 

  • See More: Definitions on Identity Theft and Data Security Breaches
About Identity Theft and Data Security Breaches

Get advice on data security, identity theft and information security breaches. Learn about corporate data breach laws and legislation, state disclosure laws including Calif. SB-1386, notification requirements and legal ramifications of data breaches, and how to prevent hackers from stealing credit card data and social security numbers.