Keep it secure
Keep it private
In the clouds
Know your admin guide
Stanford peeps
100

This requires that once evidence is acquired, full documentation be maintained regarding the who, what, when, and where related to handling of evidence

Chain of custody

100

This is the name of the Amendment that was created as a part of FERPA that requires institutions receiving federal funds to keep certain student records private

Buckley Amendment

100

This AWS service continuously monitors for suspicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3

GuardDuty

100

Information security incident response team

6.6.1

100

These guys dropped out of Stanford to build Google

Sergey Brin, Larry Page

200

These are the two primary rules of The Biba Model

Simple Integrity Axiom, Integrity Axiom

200

This international law was passed this year and is designed to protect the privacy of data from China

Personal Information Protection Law of the P.R.C. (“PIPL”)

200

A process where water vapor becomes liquid

Condensation

200

Responding to accessibility issues

6.8.1

200

The actress known for “Legally Blonde” who studied English Lit in the 90’s but has been on leave ever since

Reese Witherspoon

300

This is the single point of failure in Kerberos

The key distribution center

300

This new California privacy regulation will be implemented in 2023

The California Privacy Rights Act (CPRA)

300

This Google shining knight acting as a web application firewall can be especially helpful in blocking different kinds of attacks

Google Cloud Armor

300

Violations of policy and misuse of information

6.3.1

300

This graduate who worked at The Bridge and played football is now a US Senator

Cory Booker

400

The cryptographic principle stands behind the idea that cryptographic algorithms should be open to public inspection

Kerckhoff’s principle

400

After students have been notified of their privacy rights and the opportunity to opt out, Stanford is permitted to disclose this student information without consent

Directory Information

400

Use this to analyze suspicious files and URLs to detect types of malware

VirusTotal

400

Access without user consent

6.1.1

400

A dorm on campus was recently named after this out-of-this-world alumna

Sally Ride

500

This is typically considered the weakest link

Humans

500

This standard requires all HIPAA covered entities and business associates to restrict the uses and disclosures of protected health information (PHI) to the minimum amount necessary to achieve the purpose for which it is being used, requested, or disclosed

The Minimum Necessary Standard

500

According to OWASP, in 2021, this category moves up to the first position of the list of Top 10 Web Application Security Risks

Broken Access Control

500

Reporting or investigating violations or university concerns

6.2.1

500

These two US presidents went to Stanford

Herbert Hoover, JFK (he audited classes at the GSB)

M
e
n
u