Ch19 Flashcards

1
Q

often combine political motivations with the thrill of hacking

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RFC 1087 - Ethics and the Internet

Characterizes unethical and unacceptable any activity which purposely:

A

(a) seeks to gain unauthorized access to the resources of the Internet,
(b) disrupts the intended use of the Internet,
(c) wastes resources (people, capacity, computer) through such actions,
(d) destroys the integrity of computer-based information,
(e) compromises the privacy of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the 6 categories of computer crimes and motive for each

A

military/intelligence - launched to acquire secret information that could not be obtained legally
terrorist - attacks designed to disrupt normal life
financial - phone phreaking is an example of a financial attack
business - launched against civilian organizations to acquire secret information that could not be obtained legally
thrill - can be annoying and
costly
grudge - to cause damage by destroying data or using information to embarrass an organization or person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

any event that has a negative outcome affecting the confidentiality, integrity, or availability of an organization’s data

A

incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the 4 common types of incidents

A

scanning, compromises, malicious code, and denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the first step to detecting incidents

A

recognize abnormal and suspicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the 3 basic ways to confiscate evidence

A
  • subject volunteers the information, such as at a place of business where they are motivated to find out what happened
  • Subpoena
  • Warrant - if there is a chance that that the owner will try to alter or destroy the evidence (most useful)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the first step to report an incident

A

establish a working relationship with corporate and law-enforcement personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the basic requirements for evidence to be admissible in a court of law

A

relevant to a fact at issue in the case
fact must be material to the case
the evidence must be competent or legally collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

consists of actual objects that can be brought into the courtroom

A

Real evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

consists of written documents that provide insight into the facts

A

Documentary evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

consists of verbal or written statements made by witnesses

A

Testimonial evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code of Ethics Preamble:

A

The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior. Therefore, strict adherence to this Code is a condition of certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code of Ethics Canons:

A
  • Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  • Act honorably, honestly, justly, responsibly, and legally
  • Provide diligent and competent service to principles.
  • Advance and protect the profession.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly