Risk Management
Third Party
Data Legislation
100

This attack involves an unauthorized party intercepting communication between two systems.

What is a man-in-the-middle attack?

100

This type of software is developed by companies other than the company that created the computer’s operating system.

  • What is third-party software?


100

This act recognizes that any original work is the property of its creator.

What is the Copyright Act 1968?

200

A common social engineering technique used to trick people into revealing sensitive information.

What is phishing?

200

A potential risk of using third-party software that involves unauthorized access or malicious activities.

What is a security vulnerability?

200

This law governs the collection, storage, and communication of personal information by businesses with over $3 million in revenue.

What is the Privacy Act 1988?

300

This strategy involves testing software for vulnerabilities by simulating attacks.

What is penetration testing?

300

One way to manage the risks of third-party software is by ensuring that it is always this.

What is keeping up-to-date?

300

This act focuses on the collection and handling of health information in Victoria's public and private sectors.

What is the Health Records Act 2001?

400

A method of managing vulnerabilities by keeping track of changes and versions of software.

What is version control?

400

This risk of third-party software can result in high battery usage or excessive use of system resources like RAM and CPU.

What is higher resource usage?

400

Under the Health Records Act, medical information can be shared without consent when there is a threat to public health or for this reason.

What is public interest research?

500

This type of encryption is used to secure communications over the internet, commonly known by its abbreviation TLS or SSL.

What is Transport Layer Security (TLS)?

500

You can manage third-party software risks by scanning the software installers for this type of harmful program.

What is malware?

500

This Victorian law ensures privacy and data protection for government agencies.

What is the Privacy and Data Protection Act 2014?

M
e
n
u