CHAPTER 19 Flashcards

1
Q

The legal and ethical aspects of computer security encompass a broad
range of topics.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer attacks are considered crimes but do not carry criminal
sanctions

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computers as targets is a form of crime that involves an attack on data
integrity, system integrity, data confidentiality, privacy, or availability

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The relative lack of success in bringing cybercriminals to justice has
led to an increase in their numbers, boldness, and the global scale of their operations

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

No cybercriminal databases exist that can point investigators to
likely suspects.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The successful use of law enforcement depends much more on

technical skills than on people skills

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software is an example of real property

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An example of a patent from the computer security realm is the RSA
public-key cryptosystem.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A servicemark is the same as a trademark except that it identifies and
distinguishes the source of a service rather than a product

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Concerns about the extent to which personal privacy has been and
may be compromised have led to a variety of legal and technical

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual’s use of computer resources.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer technology has involved the creation of new types of
entities for which no agreed ethical rules have previously been formed

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anyone can join the Ad Hoc Committee on Responsible Computing

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The first comprehensive privacy legislation adopted in the United
States was the Privacy Act of 1974.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

A

Computers as targets

17
Q

The success of cybercriminals, and the relative lack of success of law enforcement, influence the behavior of _______.
A. cyber thieves B. cybercrime victims
C. cybercrime acts D. cyber detectives

A

cybercrime victims

18
Q

Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are _______.
A. real property B. cyber property
C. personal property D. intellectual property

A

real property

19
Q

Personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, and pets are all examples of _________.
A. intellectual property B. real property
C. personal property D. cyber property

A

personal property

20
Q

Any intangible asset that consists of human knowledge and ideas is _______.

A

intellectual property

21
Q

_____ can be copyrighted.
A. Dramatic works B. Architectural works
C. Software-related works D. All of the above

A

All of the above

22
Q

The copyright owner has which exclusive right(s)?
A. reproduction right B. distribution right
C. modification right D. all of the above

A

all of the above

23
Q

A _______ for an invention is the grant of a property right to the inventor.
A. patent B. copyright
C. trademark D. claim

A

patent

24
Q

A ______ is a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.
A. copyright B. patent
C. trademark D. all of the above

A

trademark

25
Q

_____ strengthens the protection of copyrighted materials in digital format.
A. HIPPA B. DMCA
C. WIPO D. DRM

A

DMCA

26
Q

A ________ provides distribution channels, such as an online shop or a Web retailer.
A. content provider B. distributor
C. consumer D. clearinghouse

A

distributor

27
Q

________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.
A. Anonymity B. Pseudonymity
C. Unobservability D. Unlinkability

A

Unlinkability

28
Q

________ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.
A. Anonymization B. Data transformation
C. Immutable audit D. Selective revelation

A

Anonymization

29
Q

______ is intended to permit others to perform, show, quote, copy, and otherwise distribute portions of the work for certain purposes.
A. Reverse engineering B. Personal privacy
C. Fair use D. Encryption research

A

Fair use

30
Q

________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.
A. Immutable audit B. Selective revelation
C. Associative memory D. Anonymization

A

Selective revelation