IS3230 CHAPTER 5 Flashcards
A confirmed event that compromises the confidentiality, integrity, or availability of information is called ___.
BREACH
Requires a business operating in California to notify customers when it has reason to believe that personal information has been disclosed through unauthorized access is called ___.
CALIFORNIA IDENTITY THEFT STATUTE
A federal criminal statute designed to protect electronic data from theft is called ___.
COMPUTER FRAUD AND ABUSE ACT (CFAA)
A method of scrambling data for security purposes. Published in 1974, it has since been broken and is no longer considered highly secured is called ___.
DATA ENCRYPTION STANDARD (DES) ENCRYPTION
A US copyright law that enacts criminal penalties for breaking or distributing technology designed to break digital rights management technologies is called ___.
DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)
Random data that is used as the basis for an encryption algorithm. The randomness of this data provides an additional layer of security to the encryption is called ___.
HASH SALT
The method used to store passwords up to 15 characters in Windows operating systems prior to Window Vista is called ___.
LAN MANAGER (LM) HASH
A challenge-response authentication protocol used by NT servers when using the Server Message Block (SMB) protocol is called ___.
NTLM HASH
A comprehensive process for determining the privacy, confidentiality, and security risks associated with the collection, use, and disclosure of personal information. It also describes the measures used to mitigate, and if possible, eliminate identified risks is called ___.
PRIVACY IMPACT ASSESSMENT (PIA)
An ID badge with an embedded radio frequency identification chip. This chip can store information about the badge holder, such as authentication information and security access levels is called ___.
RADIO FREQUENCY IDENTIFICATION (RFID) BADGES
An encrypted password database used in Unix and Linus operating systems is called ___.
SHADOW PASSWORD
A group of 188 nations that have signed treaties to protect intellectual property across national borders is called ___.
WORLD INTELLECTUAL PROPERTY ORGANIZATION (WIPO)
- Information security falls strictly under the jurisdiction of federal law–state law does not restrict information security practices.
TRUE OR FALSE
FALSE
- The two primary federal law that are concerned with information security are the Digital Millennium copyright Act and the ____.
Computer Fraud and Abuse Act
- Which federal law discussed in the chapter allows civil actions to be brought against individuals who sell passwords?
- CFAA
- DMCA
- DCMA
- CFFA
CFAA