40.4 Information Security and Privacy Flashcards
Employees shall obtain _____ _____ prior to using personally-owned computers or electronic devices (i.e., USB/flash drives, portable hard drives, smart phones, tablets) for work-related activities.
departmental approval
What form shall be used when requesting use of technology outside of state issued equipment or specific internet access?
CHP 109
It is the responsibility of _____ ____ to protect these assets and take a proactive role in preserving CHP data and associated computer resources/equipment.
every user
Only the _____ __ _____ _____, with the approval of the Department ISO, has the authority to approve the ongoing monitoring of a specific account
Office of Internal Affairs
Employees who receive inappropriate e-mail through the departmental e-mail system shall immediately forward the e-mail to their respective ________ for investigation and resolution. After forwarding an inappropriate e-mail, employees shall delete the e-mail from their respective account.
commander
Employees should consider all postings on such sites as ______, whether or not they have marked the site as private, locked, etc., due to the possibility of third parties importing parts of the site into the public domain
Public
Short term access to wireless network for visitors could be granted. Temp accounts could be made. This access lasts for ___ ________ day(s) and ending at ____ hours.
one business, 1700
With the exception of employees who have been trained and designated as ‘Information Officers’ by Office of Community Outreach and Media Relations, maintenance of a social network site and/or social media while on duty is prohibited, as well as off-duty
postings that may cause discredit to the Department, and unauthorized posting of Department badges, uniforms, emblems, etc. (refer to Chapter 16 of this manual). Also, due to the possibility that, once posted, pictures, video recordings, and other images of CHP peace officers may exist in cyberspace forever, CHP peace officer employees should be aware that such postings could make them ineligible for specialized positions where anonymity is required. In addition, due to potential personal and professional ramifications of such postings, CHP employees are advised that they should obtain permission from the CHP peace officers who are in the image prior to posting photographs, videos, or any image of CHP peace officers on the Internet, whether or not identified as a peace officer.
That one was a fun fact
Be advised that the Department ____ hold employees responsible for all postings on their Web sites or social network/media, and ____ take disciplinary action, up to and including dismissal, if any employee misuses CHP materials and/or images of uniformed CHP peace officers
will, may
A ____ is an unwanted computer program that copies itself into other programs. After running an infected program, the code in the virus executes and replicates itself. Computer viruses often delete information or cause systems to malfunction. Viruses may activate when a program executes, or may wait to execute until a specific date or activity occurs.
virus
_______ have the ability to self-replicate with no user action necessary, and do not need to attach to other applications.
worms
______ horses are concealed in programs which appear useful to a user but in fact
contain hostile code which facilitates unauthorized access to resources on the
computer by hackers.
trojan
A _______ is an infection designed to conceal the fact that it has been installed, which can hide from common protection methods, may appear as a Trojan horse to entice a user to run it, and may contain backdoors to grant remote code execution ability by hackers.
rootkit
________ secretly collects personal information about a user for use by hostile parties and can include key loggers, popup advertisements, or Web redirectors.
Adware typically downloads and displays advertisements which can appear legitimate but can have malicious intent, such as installing ______ (same answer as first blank.
spyware
All files received ________ be scanned for viruses prior to storage on the network or
transfer to another employee.
shall