PrivacyViolation侵犯隐私

PrivacyViolation侵犯隐私


2024年5月7日发(作者:火币官方网站下载)

[3] Safe Harbor Privacy Framework, U.S. Department of Commerce,

[4] Financial Privacy: The Gramm-Leach Bliley Act (GLBA), Federal Trade Commission,

[5] Health Insurance Portability and Accountability Act (HIPAA), U.S. Department of Human Services,

[6] California SB-1386, Government of the State of California, 2002,

[7] M. Howard, D. LeBlanc, Writing Secure Code, Second Edition, Microsoft Press, 2003

[8] SQLCipher.,

[9] FUNDAMENTALS-4: Establish trust boundaries, Oracle,

[10] CONFIDENTIAL-2: Do not log highly sensitive information, Oracle,

[11] INPUT-1: Validate inputs, Oracle,

[12] Standards Mapping - Common Weakness Enumeration, CWE ID 359

[13] Standards Mapping - OWASP Mobile Top 10 Risks 2014, M2 Insecure Data Storage

[14] Standards Mapping - OWASP Top 10 2007, A6 Information Leakage and Improper Error Handling

[15] Standards Mapping - OWASP Top 10 2013, A6 Sensitive Data Exposure

[16] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1, Requirement 3.2, Requirement 3.4, Requirement 4.2,

Requirement 8.4

[17] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2, Requirement 3.2, Requirement 3.4, Requirement 4.2,

Requirement 6.5.6, Requirement 8.4

[18] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0, Requirement 3.2, Requirement 3.4, Requirement 4.2,

Requirement 6.5.5, Requirement 8.4

[19] Standards Mapping - Payment Card Industry Data Security Standard Version 3.0, Requirement 3.2, Requirement 3.4, Requirement 4.2,

Requirement 8.2.1

[20] Standards Mapping - Payment Card Industry Data Security Standard Version 3.1, Requirement 3.2, Requirement 3.4, Requirement 4.2,

Requirement 8.2.1

[21] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2, Requirement 3.2, Requirement 3.4, Requirement 4.2,

Requirement 8.2.1

[22] Standards Mapping - Security Technical Implementation Guide Version 3.1, APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I

[23] Standards Mapping - Security Technical Implementation Guide Version 3.10, APP3210.1 CAT II, APP3340 CAT I

[24] Standards Mapping - Security Technical Implementation Guide Version 3.4, APP3210.1 CAT II, APP3340 CAT I

[25] Standards Mapping - Security Technical Implementation Guide Version 3.5, APP3210.1 CAT II, APP3340 CAT I

[26] Standards Mapping - Security Technical Implementation Guide Version 3.6, APP3210.1 CAT II, APP3340 CAT I

[27] Standards Mapping - Security Technical Implementation Guide Version 3.7, APP3210.1 CAT II, APP3340 CAT I

[28] Standards Mapping - Security Technical Implementation Guide Version 3.9, APP3210.1 CAT II, APP3340 CAT I

[29] Standards Mapping - Security Technical Implementation Guide Version 4.1, APSC-DV-000650 CAT II, APSC-DV-001740 CAT I,

APSC-DV-001750 CAT I, APSC-DV-002330 CAT II, APSC-DV-002570 CAT II, APSC-DV-002580 CAT II

[30] Standards Mapping - Web Application Security Consortium 24 + 2, Information Leakage

[31] Standards Mapping - Web Application Security Consortium Version 2.00, Information Leakage (WASC-13)


发布者:admin,转转请注明出处:http://www.yc00.com/xitong/1715090337a2564463.html

相关推荐

发表回复

评论列表(0条)

  • 暂无评论

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信