Information Privacy Data - Surveillance - Computer Misuse Flashcards

1
Q

What kind of data has the employee access to?

A
  • Network control systems that can view email/ internet usage
  • telephone recordings systems
  • CCTV
  • staff / personnel records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why the concern of information privacy?

A
  • social media
  • media sanctioned exhibitionism
  • location sensitive apps
  • reward-based privacy destruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When surveillance is allowed in the workplace?

A
  • detecting crime
  • compliance with regulatory standards
  • establishing existence of facts
  • staff quality control and training
  • ## protecting system from viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the information commissioner code on monitoring at work 2003?

A

This code is intended to help employers comply with the Data Protection Act and to encourage them to adopt good practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Briefly describe Data Protection Act 1998.

A

It ensures that information about citizens will be used only for the purposes for which they gave it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Communications Act 2003?

A

I governs aspects of the internet, email, mobile phone calls and text messaging

  • made illegal to use other people’s WiFi w/o permissions
  • made illegal to send electronic/phone messages
  • persistently make user of a public electronic communication network for the purpose of causing annoyance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Privacy Electronic Communications Regulations 2003 (PECR)?

A

It protects a citizen’s right to “privacy”

  • processing of electronic data
  • location data and billing data
  • calling or connected line identification
  • directories of subscribers
  • Cookies must, tell people that they exist, explain for what and obtain their consent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Regulation of Investigatory Powers Act 2000 (RIPA)?

A

It protects against unreasonable intrusion of electronic communication and provides for privacy of communication

  • interception of communications
  • the acquisition and disclosure of data relating to communications
  • carrying out surveillance
  • riles on governance and oversight
  • lawful if both sender and recipient have given consent
  • unlawful to intentionally intercept communications by means of a private system without a system’s owner consent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Investigatory Powers Act, 2016 (‘Snooper’s Charter’) IPA?

A

expands the powers of the UK Intelligence
agencies
- it prohibits interception of communications without lawful authority
- allows police, intelligence officers to see the internet connection records as part of a targeted and filtered investigation without a warrant
- permit law enforcement agencies to hack pc
- places legal obligation on CSP to assist with data when required
- list agencies allowed to access data without a warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

US legislation

A

The Fourth Amendment limits the ability of government agents to search for and seize evidence without a warrant. It generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed container and examining its contents in the same situation.

In 1967, US Supreme Court held that the requirements of the Fourth Amendment applied equally to electronic surveillance and to physical searches

  • Wiretap Act
  • Electronic Communications Privacy Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Cyber

-enabled crime

A

It is ‘traditional’ crimes conducted online such as terrorism, child
pornography,
financial crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Advanced cyber crime?

A

(or high
-tech crime)
– sophisticated attacks against computer hardware and
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Attack Sources?

A

in the past, individuals or small groups. Now - highly complex global cybercriminal networks, state organisations (espionage, disruption, terror)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Cyber Defence ?

A

The law enforcement agencies with cyber-skills and global reach, with no physical or virtual borders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe what malware is ?

A

A program that is covertly inserted into another program with the intent to destroy data, run intrusive or destructive programs, or otherwise compromise the confidentiality, integrity or availability of the victim’s data, applications, or operating system.

Classified by how it spreads or propagates and by its payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Briefly describe the various types of malware

A
  • Advance fee fraud, people targeted with large sums of money for payments upfront
  • Bots, PC infected with malware that delivers payload when triggered
  • Zombie, PC compromised and used to perform malicious task under remote control
  • DoS Malicious disruption of operation of a specific entity in cyber space using multiple attacking sources
  • Phishing, a process where social engineering is used to trick into confidential info
  • Trojan, malware that appears to perform a desirable function for the user prior to run
  • Rootkit, grant super user access to a pc and hiding its presence from admin
  • Spam, bulk sending of e-mails to users
17
Q

What is the virus lifetime?

A
  • Dormant phase
  • Propagation phase
  • Triggering phase
  • Execution phase
18
Q

What is a worn?

A

A program that actively seeks more machines to infect and then acts as a launching pad for attacks on other systems
- It propagates trough email, file sharing or remote execution.

19
Q

What are the types of worm?

A
  • multiplatform
  • multi exploit, penetrates system in a variety of ways
  • ultrafast, technique that optimize rate of propagation
  • polymorphic, generates new code in flight
  • metamorphic, adopts different behaviors at different stages
  • zero day exploits, worm exploits unknown vulnerability to achieve maximum surprise and distribution
20
Q

What is hacktivism?

A

the use of legal and/or illegal digital tools in pursuit of political ends

21
Q

Malware as weapon

A

The worm itself now appears to have included two major components. One was designed to send Iran’s nuclear centrifuges spinning wildly out of control.

22
Q

What cross site request forgery ?

A

a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts

23
Q

What is Cookie Stuffing?

A

when a user visits a website and as a result of that visit receives a third-party cookie from an entirely different website (target affiliate website), usually without the user being aware of it.

24
Q

What is Cloaking?

A

search engine optimization (SEO) technique in which the content presented to the
search engine spider is different to that presented to the user’s browser.

25
Q

Briefly describe Computer Misuse Act 1990

A
  • Unauthorized access to computer material, access with intent to commit or facilitate commission or further offenses.
26
Q

Briefly describe Police and Justice Bill, 2006

A

Increased maximum penalty for attempting to gain unauthorized access from 6 months to 12
months
- Made impairing the operation of a computer an offense with a maximum penalty of 12 months

27
Q

Briefly describe EU Directive on Security of Network and Information Systems (2016)

A

NIS Directive represents the first EU-wide rules on cybersecurity – aims to achieve a high common level of security of network and information systems across the EU Increased EU-level cooperation (cross-border ‘Co-operation Group’

28
Q

What digital investigation is?

A
  • Searching for information on a computer

- Any user does digital investigation when searching for files

29
Q

What digital evidence?

A
  • Provative information stored or transmitted in digital form
  • May be used at trial
30
Q

Briefly describe Digital Forensic Evidence.

A
  • Special case of a digital investigation
  • Procedures and techniques used allow the results to be used for trials
  • Need to ensure that the state of the computer is preserved or need to use trusted tools
31
Q

Briefly describe the Limitations of Legislation.

A
  • Legislation becomes out of date, but technology and computer criminals move quickly
  • Government criticized for placing main responsibility for security on individuals
  • Attempts being made to link across jurisdictions