Ethics & Law Part 1 Flashcards

1
Q

To minimize liabilities/reduce risks, the information security practitioner must:

A

Understand current legal environment, stay current with laws and regulation, watch out for new issues that emerge, be aware that laws change based on your field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are laws?

A

Rules, enforced by government agencies, that mandate or prohibit certain societal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ethics?

A

Rules and practices, enforced by society and personal interaction, which define socially acceptable behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Laws carry the authority of a governing authority; ethics do not.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a liability?

A

The legal obligation of an entity extending beyond criminal or contract law. Includes the legal obligation to make restitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is restitution?

A

The legal obligation to compensate an injured party for wrongs committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is “Right to work” ?

A

Not force to join a union

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does “At Will” mean?

A

if no contract either party may sever a relationship for any reason

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s a salary?

A

paid fixed amount regardless of hours worked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Exempt mean (from Fair Labor Standards Act)?

A

not paid overtime (must meet minimum requirements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a jurisdiction?

A

Court’s right to hear a case if the wrong was committed in its territory or involved its citizenry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Long-arm jurisdiction?

A

Application of laws to those residing outside a court’s normal jurisdiction; usually granted when a person acts illegally within the jurisdiction and leaves (oroperates virtually).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is due care?

A

Taking steps to ensure is in compliance with a law, regulation, or requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is due diligence?

A

Ensure org continues to meet obligations – the management of due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Indemnification mean?

A

Not held liable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a “get out of jail card”?

A

Authorization to violate corporate policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some traits of policies?

A

managerial directives that specify acceptable and unacceptable employee behavior in the workplace, function as organizational “laws”, and must be crafted and implemented with care to ensure they are complete, appropriate, and fairly applied to everyone.

18
Q

To be enforceable in court, a policy must be:

A
  • Not be itself illegal
  • Distributed to all expected to comply
  • Uniformly enforced regardless of position
  • Readily available as a reference
  • Easily understood by all affected
  • Formally acknowledged
  • Have a formal, regular review process
19
Q

True or False: Policies can never require you to break a law.

20
Q

True or False: Ignorance of a policy is an acceptable defense if no training , but ignorance of law is not

21
Q

What are different types of law?

A
  • Constitutional: Org operating under terms of formal written doc
  • Statutory: written laws enacted by legislative body (Civil, Tort or Criminal)
  • Regulatory or Administrative
  • Common, Case, and Precedent
  • Private vs Public
22
Q

What is the Computer Fraud and Abuse Act of 1986 (CFA Act):

A

Cornerstone of many computer-related federal laws and enforcement efforts

23
Q

What is the National Information Infrastructure Protection Act of 1996:

A
  • Modified several sections of the previous act and increased the penalties for selected crimes
  • Severity of the penalties was judged on the value of the information and the
    purpose, for example: for purposes of commercial advantage, for private financial gain, and in furtherance of a criminal act.
24
Q

Whart are some general computer crimes/laws applicable for these crimes?

A
  • Accessing computers without authorization or in excess of authorization
  • Faking identity
  • Distribution of malicious code
  • Denial of service attacks
  • Trafficking in passwords
  • Knowingly transmitting a malicious program, code, command or other malicious
    information
  • Using electronic methods to probe, disable or compromise a system or to make use
    of it outside of its intended purpose (“hacking”)
25
What is the USA PATRIOT Act of 2001?
broader latitude in order to combat terrorism-related activities.
26
What is the USA PATRIOT Improvement and Reauthorization Act?
**made many expanded powers permanent** and **expanded powers of DHS and the FBI in investigating terrorist activity**.
27
What is the USA FREEDOM Act?
inherited select USA PATRIOT functions as the PATRIOT act expired in 2015.
28
What is the Computer Security Act of 1987?
One of the first attempts to protect federal computer systems
29
What is the Federal Information Security Management Act?
Passed in 2002, and mandates all federal agencies establish information security programs to protect their information assets.
30
What was the FISMA Reform?
- Federal Information Security Modernization Act of 2014 - Focused on enhancing the federal government’s ability to respond to security attacks on government agencies and departments.
31
What’s privacy?
The right to protect from unauthorized access, providing confidentiality
32
What are some U.S privacy regulations?
- Privacy of Customer Information Section of the Common Carrier regulation - Federal Privacy Act of 1974 - Electronic Communications Privacy Act of 1986 - Health Insurance Portability and Accountability Act of 1996 (HIPAA), or the Kennedy-Kassebaum Act - Financial Services Modernization Act, or Gramm-Leach-Bliley Act of 1999
33
What is information aggregation?
Information assembles from multiple sources
34
Identity theft can occur when…
Someone steal’s victims personally identifiable information and poses as the victim to make purchases
35
Which body oversees ID theft and fosters coordination to prosecute criminal and increase victim’s restitution?
FTC
36
What does the FTC recommend you do if you are a victim of Identity theft?
Place an initial fraud alert, order credit reports, create and identity theft report, monitor your progress
37
What does the Economic Espionage Act of 1996 (EEA) and the Security and Freedom through Encryption Act of 1999 (SAFE) say about encryption?
**Reinforce the right to use or sell encryption algorithms, without concern of key registration, prohibit the federal government from requiring it, make it not probable cause to suspect criminal activity, relax export restrictions, additional penalties for using it in a crime**.
38
What is the Sarbanes- Oxley Act of 2002?
- Affects the executive management of publicly traded corporations and public accounting firms. - Seeks to improve the reliability and accuracy of financial reporting and increase the accountability of corporate governance in publicly traded companies. - It provides penalties for noncompliance ranging from fines to jail terms.
39
What is the Freedom of Information Act of 1966 (FOIA)
Allows access to fed agency records that are not deemed to be a matter of national security. U.S. gov agencies required to disclose and requested info. This act doesn’t apply to local for state gov.
40
What are Ohio Sunshine Laws or Ohio Public Record Act?
- Records of the government are “the people’s records” - Provides citizens steps to request records - Protects some records from being withheld - Record management determines time to keep records
41
What is the Payment Card Industry Data Security Standards (PCI DSS)?
- Developed to enhance cardholder data security - provides baseline of technical requirements to protect account data - applies to entities involved in payment card processing such as merchants, processors, etc. - applies to entities such as store, process, or transmit cardholder data
42
What are the PCI DSS areas and requirements in these areas?
Build and maintain secure network and system-> install and maintain firewall to protect card holder data Protect cardholder data-> encrypt transmission of card holder data Maintain vulnerability management-> protect all systems against malware Implement strong access control measures-> restrict access to cardholder data by business Regularly monitor and test networks-> track all access to network resources and cardholder data Maintain info security policy-> maintain policy that addresses info security for all personnel