Legal Laws and Cyber Acts
Name of Term | Description of term |
---|---|
RFC 1918 | For Private IP Standard |
RFC 3227 | For Data collection and storage |
ISO 27002 | For Information Security Guidelines |
CAN-SPAM | For Email Marketing |
SPY-Act | For License Enforcement |
DMCA | For Intellectual Property |
SOX | For Corporate Finance Processes |
GLBA | For Personal Finance Data |
FERPA | For Education Records |
FISMA | For Government Networks Security Standards |
CVSS | For Common Vulnerability Scoring System |
CVE | For Common Vulnerabilities and Exposure |
Ethical Hacking Cheatsheet
Ethical hacking includes authorized attempts to gain unauthorized access to computer systems, applications, or data. Ethical hacking requires replicating the strategies and behaviors of malicious attackers. This practice helps identify security vulnerabilities, So they can be fixed before malicious attackers can exploit them.