acceptable use policy (AUP) ✔✔A document that stipulates restrictions and practices that a user
must agree in order to use organizational computing a
... [Show More] nd network resources.
advanced persistent threat (APT) ✔✔A network attack in which an intruder gains access to a
network and stays there—undetected— with the intention of stealing data over a long period of
time (weeks or even months).
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) ✔✔An agreement
of the World Trade Organization that requires member governments to ensure that intellectual
property rights can be enforced under their laws and that penalties for infringement are tough
enough to deter further violations.
anti-SLAPP laws ✔✔Laws designed to reduce frivolous SLAPPs (strategic lawsuit against public
participation [SLAPP], which is a lawsuit filed by corporations, government officials, and others
against citizens and community groups who oppose them on matters of concern).
Bathsheba syndrome ✔✔The moral corruption of people in power, which is often facilitated by a
tendency for people to look the other way when their leaders act inappropriately.
blended threat ✔✔A sophisticated threat that combines the features of a virus, worm, Trojan horse,
and other malicious code into a single payload.
bring your own device (BYOD) ✔✔A business policy that permits, and in some cases, encourages
employees to use their own mobile devices (smartphones, tablets, or laptops) to access company
computing resources and applications, including email, corporate databases, the corporate intranet,
and the Internet.
BSA | The Software Alliance (BSA) ✔✔A trade group that represent the world's largest software
and hardware manufacturers.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
✔✔Software that generates and grades tests that humans can pass and all but the most sophisticated
computer programs cannot.
Child Online Protection Act (COPA) ✔✔An act signed into law in 1998 with the aim of prohibiting
the making of harmful material available to minors via the internet; the law was ultimately ruled
largely unconstitutional.
Children's Internet Protection Act (CIPA) ✔✔An act passed in 2000; it required federally financed
schools and libraries to use some form of technological protection (such as an internet filter) to
block computer access to obscene material, pornography, and anything else considered harmful to
minors.
CIA security triad ✔✔Refers to confidentiality, integrity, and availability.
clinical decision support (CDS) ✔✔A process and a set of tools designed to enhance healthcarerelated decision making through the use of clinical knowledge and patient-specific information to
improve healthcare delivery [Show Less]