When you protect information systems. Physically.
What is Physical Security Controls?
When they know all your passwords and stuff
What is a Data breach?
Imagine I pretend to break into your house to see how easy it is to break into your house. But your house is a computer system.
What is penetration testing?
This can be done to inputs to prevent XSS and SQL injections.
What is sanitisation?
An Act that recognises that any original work is the property of whom who created it
What is the Copyright Act 1968?
when you've got some sensitive information you need to destroy
what is Shredding Confidential Documents?
Can involve dude with a laptop in the corner of a café using a fake network to steal your data
What is a Man-In-The-Middle Attack?
Its one of the risks of poor code, resulting in a loss of data
What is data?
Involved running malicious JavaScript code through user input
Includes the rules for the collection, storage and communication of personal information
What is the Privacy Act 1988?
Imagine someone cut off your finger, and was able to use it to gain access to your information systems
What is Biometrics?
Imagine your grandma needs $500 for her urgent knee surgery. Send that over right way, she needs it.
What is Phishing?
It involves reviewing a software and assessing its security
What is software auditing
Risks on web applications
What are web application risks?
Involves the collection and handling of health information in public and private sector
What is the Health Records Act 2001?
When you only allow certain people into certain areas
What are Zoned Security Strategies?
They're using mind games to get a hold of your data
What is Social Engineering?
Things you are trying to minimise through auditing during the software development process
What are risks?
Involves running malicious SQL commands to add, modify or delete data from SQL databases
What are SQL injections?
Laws created by parliament