This attack involves an unauthorized party intercepting communication between two systems.
What is a man-in-the-middle attack?
This type of software is developed by companies other than the company that created the computer’s operating system.
What is third-party software?
This act recognizes that any original work is the property of its creator.
What is the Copyright Act 1968?
A common social engineering technique used to trick people into revealing sensitive information.
What is phishing?
A potential risk of using third-party software that involves unauthorized access or malicious activities.
What is a security vulnerability?
This law governs the collection, storage, and communication of personal information by businesses with over $3 million in revenue.
What is the Privacy Act 1988?
This strategy involves testing software for vulnerabilities by simulating attacks.
What is penetration testing?
One way to manage the risks of third-party software is by ensuring that it is always this.
What is keeping up-to-date?
This act focuses on the collection and handling of health information in Victoria's public and private sectors.
What is the Health Records Act 2001?
A method of managing vulnerabilities by keeping track of changes and versions of software.
What is version control?
This risk of third-party software can result in high battery usage or excessive use of system resources like RAM and CPU.
What is higher resource usage?
Under the Health Records Act, medical information can be shared without consent when there is a threat to public health or for this reason.
What is public interest research?
This type of encryption is used to secure communications over the internet, commonly known by its abbreviation TLS or SSL.
What is Transport Layer Security (TLS)?
You can manage third-party software risks by scanning the software installers for this type of harmful program.
What is malware?
This Victorian law ensures privacy and data protection for government agencies.
What is the Privacy and Data Protection Act 2014?