1 Flashcards

1

1
Q

What is the primary focus of information security in the modern digital era?

A

Governed by legal, ethical, and professional standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the legal aspect of information security protect against?

A

Cyber threats, ensuring compliance and accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What role do ethics play in information security?

A

Guide professionals in responsible decisions regarding data privacy and cybersecurity practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is professionalism in the context of information security?

A

Maintaining integrity, competence, and a duty to protect information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the potential consequences of unethical behavior in cybersecurity?

A

Legal consequences, financial damage, reputational harm, operational disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What law can lead to criminal charges for unauthorized access (hacking)?

A

Computer Fraud and Abuse Act (CFAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can data breaches due to negligence result in?

A

Heavy fines under laws like HIPAA or GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ethical hacking?

A

Legally authorized practice of probing systems to identify vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are ethical hackers also known as?

A

White-hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the intent of unethical hacking?

A

Stealing data, causing harm, or disrupting operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who are black-hat hackers?

A

Hackers engaged in unauthorized access with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is penetration testing?

A

Simulating cyberattacks to find and fix weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a bug bounty program?

A

Companies reward ethical hackers for reporting security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the GDPR stand for?

A

General Data Protection Regulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the GDPR?

A

Protect the privacy and personal data of EU citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a key provision of the GDPR?

A

Companies must report data breaches within 72 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the Digital Millennium Copyright Act (DMCA) protect against?

A

Digital piracy and unauthorized access to copyrighted material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is one notable case associated with the CFAA?

A

Aaron Swartz Case (2011-2013).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the U.S. Electronic Communications Privacy Act (ECPA)?

A

Regulate government and private surveillance of electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is one example of unethical hacking?

A

Ransomware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fill in the blank: Ethical hackers use their skills to ______.

A

strengthen security and prevent breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fill in the blank: Unauthorized access to systems is characteristic of ______ hacking.

A

unethical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False: Ethical hacking requires authorization from the system owner.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: Black-hat hackers act within legal and ethical boundaries.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is one of the key lessons from Kevin Mitnick’s story?

A

Even notorious black-hat hackers can turn ethical and contribute positively.

26
Q

What motivates hacktivists?

A

Promote a political or social agenda.

27
Q

What happened in the 2008 cyber-attacks by Anonymous?

A

They protested against the Church of Scientology’s censorship.

28
Q

What is a gray-hat hacker?

A

Operates without permission but does not intend harm.

29
Q

What is the impact of unethical behavior in cybersecurity?

A

Causes financial losses and reputational damage.

30
Q

What is the role of cybersecurity laws?

A

Protect against unauthorized access, fraud, and data breaches.

31
Q

Who does the ECPA affect?

A

Internet users, law enforcement, ISPs, and companies storing user data.

32
Q

What does the ECPA prohibit?

A

Unauthorized interception of emails, phone calls, and online communications.

33
Q

What must law enforcement obtain to access stored digital communications?

A

A warrant.

34
Q

What can the government demand without a full warrant under the ECPA?

35
Q

What notable case involved Microsoft and the U.S. government?

A

Microsoft vs. U.S. Government (2013-2018).

36
Q

What did Microsoft argue in the notable case regarding ECPA?

A

That ECPA did not apply outside the U.S.

37
Q

Why is the ECPA significant?

A

It protects online privacy but has loopholes allowing government surveillance.

38
Q

What does intellectual property (IP) refer to in cybersecurity?

A

Creations of the mind that are legally protected from unauthorized use.

39
Q

What types of creations does IP protect in cybersecurity?

A

Software, databases, cryptographic methods, and other digital assets.

40
Q

What are the types of intellectual property protection?

A
  • Copyright
  • Patents
  • Trademarks
  • Trade Secrets
41
Q

What does copyright protect?

A

Original works, including software code, digital content, music, books, and films.

42
Q

How long does copyright protection last?

A

For the creator’s lifetime + 50 to 100 years.

43
Q

What must be filed and approved for patent protection?

A

An application by a government patent office.

44
Q

How long does patent protection last?

45
Q

What does trademark protection cover?

A

Distinctive brand elements like logos, names, and slogans.

46
Q

What is required for trademark protection?

A

Registration with trademark offices.

47
Q

How long can trademarks last?

A

Indefinitely, as long as they are renewed.

48
Q

What is a trade secret?

A

Privately held, valuable business information.

49
Q

What is required for trade secret protection?

A

No registration required; protection depends on keeping it secret.

50
Q

What are common types of software licenses?

A
  • Proprietary License
  • Open-Source License
  • Freeware
  • Shareware
51
Q

What is software piracy?

A

Unauthorized copying, distribution, or use of software without a legal license.

52
Q

What is a key requirement of ISO/IEC 27001?

A

Risk Assessment.

53
Q

What is the purpose of the NIST Cybersecurity Framework?

A

Helps organizations identify, protect, detect, respond to, and recover from cyber threats.

54
Q

What are the five core functions of the NIST Cybersecurity Framework?

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
55
Q

What is the role of an information security professional?

A

Protect organizations from cyber threats through risk assessment and policy implementation.

56
Q

What are potential consequences of negligence in cybersecurity?

A
  • Data Breaches
  • Financial Penalties
  • Loss of Trust
  • Legal Action
57
Q

What does CISSP stand for?

A

Certified Information Systems Security Professional.

58
Q

What is the focus of the CISM certification?

A

Information security governance and compliance.

59
Q

What does CEH stand for?

A

Certified Ethical Hacker.

60
Q

What is the Security+ certification?

A

Entry-level certification for IT security fundamentals.