This requires that once evidence is acquired, full documentation be maintained regarding the who, what, when, and where related to handling of evidence
Chain of custody
This is the name of the Amendment that was created as a part of FERPA that requires institutions receiving federal funds to keep certain student records private
Buckley Amendment
This AWS service continuously monitors for suspicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3
GuardDuty
Information security incident response team
6.6.1
These guys dropped out of Stanford to build Google
Sergey Brin, Larry Page
These are the two primary rules of The Biba Model
Simple Integrity Axiom, Integrity Axiom
This international law was passed this year and is designed to protect the privacy of data from China
Personal Information Protection Law of the P.R.C. (“PIPL”)
A process where water vapor becomes liquid
Condensation
Responding to accessibility issues
6.8.1
The actress known for “Legally Blonde” who studied English Lit in the 90’s but has been on leave ever since
Reese Witherspoon
This is the single point of failure in Kerberos
The key distribution center
This new California privacy regulation will be implemented in 2023
The California Privacy Rights Act (CPRA)
This Google shining knight acting as a web application firewall can be especially helpful in blocking different kinds of attacks
Google Cloud Armor
Violations of policy and misuse of information
6.3.1
This graduate who worked at The Bridge and played football is now a US Senator
Cory Booker
The cryptographic principle stands behind the idea that cryptographic algorithms should be open to public inspection
Kerckhoff’s principle
After students have been notified of their privacy rights and the opportunity to opt out, Stanford is permitted to disclose this student information without consent
Directory Information
Use this to analyze suspicious files and URLs to detect types of malware
VirusTotal
Access without user consent
6.1.1
A dorm on campus was recently named after this out-of-this-world alumna
Sally Ride
This is typically considered the weakest link
Humans
This standard requires all HIPAA covered entities and business associates to restrict the uses and disclosures of protected health information (PHI) to the minimum amount necessary to achieve the purpose for which it is being used, requested, or disclosed
The Minimum Necessary Standard
According to OWASP, in 2021, this category moves up to the first position of the list of Top 10 Web Application Security Risks
Broken Access Control
Reporting or investigating violations or university concerns
6.2.1
These two US presidents went to Stanford
Herbert Hoover, JFK (he audited classes at the GSB)