Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ween the Internet and system components, including the choke router at the Internet, the DMZ router and firewall, the DMZ cardholder segment, the perimeter rou ...
    446 bytes (56 words) - 12:06, 16 June 2010
  • ...older data environment to the Internet such that outbound traffic can only access IP addresses within the DMZ.'''<br> ...ound traffic from the cardholder data environment to the Internet can only access IP addresses within the DMZ.<br> ...
    2 KB (276 words) - 11:07, 16 June 2010
  • ...loyees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key prot ...-control.jpg]] [[PCI-1.1.3:|PCI-1.1.3 Requirements for a firewall at each Internet connection and between any demilitarized zone (DMZ) and the internal networ ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...] The ECPA also criminalizes obtaining, altering, or preventing authorized access to electronic storage.[[FN65]] Under the ECPA, it is a crime to break into ...servers:''' Search and seizure of defendant's e-mail files from server of Internet service provider (ISP) by technicians of ISP was reasonable under Fourth Am ...
    3 KB (456 words) - 11:09, 18 February 2009
  • ...d turn off computer to control information that came into their homes from internet. U.S.C.A. Const. Amend. 1; M.C.L.A. § 722.675(1). Cyberspace Communications ...preventing use of library computers to view online pornography. Children's Internet Protection Act, § 1701, 114 Stat. 2763A-335. Miller v. Northwest Region Lib ...
    4 KB (578 words) - 12:38, 18 February 2009
  • ...nces, network segmentation, and intrusion detection) are used to authorize access and control information flows from and to networks. ...has policies and procedures regarding program development, program change, access to programs and data, and computer operations, which are periodically revie ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...ime. California, for example, defines computer crime to be the intentional access of a computer system "for the purpose" of a scheme or artifice to defraud o ...zed access to computer systems, have argued in defense that they attempted access to computer systems not knowing what systems they might get into.[[FN5]] ...
    3 KB (513 words) - 18:22, 22 February 2009
  • ...activity. An individual with a remote terminal at his or her home may get access to the victim's computer system from virtually anywhere there is a phone co ...from gaining access to a computer that is not reflected by a change in the access code. ...
    4 KB (717 words) - 18:04, 22 February 2009
  • ...e Internet (for example, laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...
    442 bytes (66 words) - 12:09, 16 June 2010
  • :'''Prohibit direct public access between external networks and any system component that stores cardholder i :* To determine that direct access between external public networks and components storing cardholder data are ...
    2 KB (308 words) - 11:40, 3 March 2007
  • =='''Sample Internet Acceptable Use Standard'''== This Internet Acceptable Use Standard builds on the objectives established in the [[Sampl ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • Under federal law, it is illegal to use any unauthorized access device, including a computer, to obtain money, goods, services, or any othe ...uirement of the Digital Millennium Copyright Act (DMCA), where it provided Internet service provider with information that identified two newsgroup sites creat ...
    4 KB (642 words) - 11:15, 18 February 2009
  • ...sed had a password known only to her, and system's log-on banner described access to "monitor" the computer system, not to engage in law enforcement intrusio ...ted that in general, all computer and electronic files should be free from access by any but the authorized user of those files, and defendant's computer was ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...ts and passwords have been changed. (Use vendor manuals and sources on the Internet to find vendor-supplied accounts and passwords.)'''<br> ::::* Default SNMP community strings on access points were changed. ...
    3 KB (369 words) - 14:23, 27 February 2007
  • ...re sent from your computer through the Internet via cleartext. Anyone with access to the medium used to carry the data (the routers, computers, telecommunica ...
    1 KB (218 words) - 16:40, 14 June 2007
  • ...e Internet (for example, laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...standards are acceptable and that updates are current prior to authorizing access to employee-owned or mobile end point devices.'''<br> ...
    2 KB (296 words) - 10:57, 16 June 2010
  • :'''DCIDs: Director of Central Intelligence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFA ...evelopment of Internet Acceptable Use Standards:''' [[Media:Development-of-Internet-Acceptable-Use-Standards.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • Third party personnel who have been granted access to Company information or systems are covered by this standard and must com ...any information systems and equipment including Electronic Mail Resources, Internet Resources, and Telecommunications Resources.<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...h as Secure Sockets Layer (SSL), Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPSEC) to safeguard sensitive cardholder data during tra ...] (e.g., SSL) wherever cardholder data is transmitted or received over the Internet by performing the following:'''<br> ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...ing for schools and libraries on the installation of filtering software on Internet-ready computers to block objectionable content. ...) the E-rate program, under the Communications Act of 1934, which provides Internet and telecommunications subsidies to schools and libraries. ...
    5 KB (707 words) - 19:01, 10 April 2011
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)