Appendix A Flashcards
What year was the computer misuse act?
1990
What section of the computer misuse act is
‘Unauthorised access to computer material’ ?
Section 1
What section of the computer misuse act is
‘Unauthorised access with intent to commit or facilitate further offences’ ?
Section 2
What section of the computer misuse act is
‘Unauthorised modification of computer material’ ?
Section 3
What is section 1 of the computer misuse act?
Unauthorised access to computer material
What is section 2 of the computer misuse act?
Unauthorised access with intent to commit or facilitate further offences
Whats is section 3 of the computer misuse act?
Unauthorised modification of computer material
Vulnerability Assessment Basics?
- Quantify hosts within a network
- Assessing and documenting possible vulns
- Recommending improvements
- Rare to go through with exploitation
- Will verify all possible vulns but provides no depth to compromise
Pentest Basics?
- Goal oriented
- Maximum compromise - simplest manner
- All potential methods of compromise documented
- May miss potential vulns but shows depth of ones found
What is the lifecyle?
- Discovery
- Vulnerability Assessment
- Exploitation
- Post-Exploitation
What year was the Human Rights Act?
1998
What year was the Data Protection Act?
1998
What year was the Police and Justice Act?
2006