CHAPTER 19 Flashcards
The legal and ethical aspects of computer security encompass a broad
range of topics.
T
Computer attacks are considered crimes but do not carry criminal
sanctions
F
Computers as targets is a form of crime that involves an attack on data
integrity, system integrity, data confidentiality, privacy, or availability
T
The relative lack of success in bringing cybercriminals to justice has
led to an increase in their numbers, boldness, and the global scale of their operations
T
No cybercriminal databases exist that can point investigators to
likely suspects.
T
The successful use of law enforcement depends much more on
technical skills than on people skills
F
Software is an example of real property
F
An example of a patent from the computer security realm is the RSA
public-key cryptosystem.
T
A servicemark is the same as a trademark except that it identifies and
distinguishes the source of a service rather than a product
T
Concerns about the extent to which personal privacy has been and
may be compromised have led to a variety of legal and technical
T
The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users
T
The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual’s use of computer resources.
F
Computer technology has involved the creation of new types of
entities for which no agreed ethical rules have previously been formed
T
Anyone can join the Ad Hoc Committee on Responsible Computing
T
The first comprehensive privacy legislation adopted in the United
States was the Privacy Act of 1974.
T