19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Keyloggers<br />

Appendix: Tools and Resources<br />

Invisible KeyLogger Stealth — www.amecisco.com/iks.htm<br />

KeyGhost — www.keyghost.com<br />

SpectorSoft — www.spectorsoft.com<br />

Laws and Regulations<br />

Computer Fraud and Abuse Act — www.fas.org/sgp/crs/misc/<br />

RS20830.pdf<br />

Gramm-Leach-Bliley Act (GLBA) Safeguards Rule — www.ftc.gov/<br />

os/2002/05/67fr36585.pdf<br />

Health Information Technology for Economic and Clinical Health (HITECH)<br />

Act — http://en.wikipedia.org/wiki/Health_Information_<br />

Technology_for_Economic_and_Clinical_Health_Act<br />

Health Insurance Portability and Accountability Act (HIPAA) Security Rule —<br />

www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html<br />

Payment Card Industry Data Security Standard (PCI DSS) — www.pci<br />

securitystandards.org/security_standards/index.php<br />

Sarbanes-Oxley Act — www.sec.gov/about/laws.shtml#sox2002<br />

United States state breach notification laws — www.ncsl.org/programs/<br />

lis/cip/priv/breachlaws.htm<br />

Linux BackTrack Linux — www.backtrack-linux.org<br />

freshmeat.net — http://freecode.com<br />

GFI LanGuard — www.gfi.com/network-security-vulnerabilityscanner<br />

Linux Security Auditing Tool (LSAT) — http://usat.sourceforge.net<br />

Nexpose — www.rapid7.com/vulnerability-scanner.jsp<br />

359

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!