L23 - Law, Ethics, and Privacy Flashcards

1
Q

Technology and other safeguards for cyber security are largely defensive in nature. The only way they can impact a threat source is by increasing the work factor for an attacker. Can laws be used to reduce the magnitude of threats?

a) Yes, laws can provide criminal sanctions against those who commit cyber crime
b) No, cyber crime has increased even as new laws have been put in place

A

a) Yes, laws can provide criminal sanctions against those who commit cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber crime is a big problem. According to a recent report, what is an estimate of the cost of cybercrime for the United States?

a) 10 billions of dollars
b) Over 100 billion dollars

A

b) Over 100 billion dollars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Computer Fraud and Abuse Act was used to prosecute the creator of the Melissa virus and he was sentenced in federal prison and fined by using its provisions. What abuse was perpetrated by the Melissa virus?

a) Data stored on computer was destroyed
b) Denial-of-service attacks that made computers unusable

A

b) Denial-of-service attacks that made computers unusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Several people have argued about the overly general and vague language of the CFAA. For example, how exactly is unauthorized access defined? In one case, a company sued its competitor because the competitor’s employees created a trial subscription and downloaded data that was available to its subscribers. Do you think this is a violation of unauthorized access?

a) No, the data was publicly available
b) Yes, because it potentially can cause financial loss to the company that sued its competition

A

a) No, the data was publicly available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The DMCA includes exclusions for researchers but companies have threatened to sue researchers who wanted to publish work related to circumvention of anti-piracy technologies, Which of these is an example of such a threat under DMCA?

a) Prof Ed Felten’s research on audio watermarking removal by RIAA
b) A research project done by MIT students that found vulnerabilities in the Boston Massachusetts Bay Transit Authority (MBTA)

A

a) Prof Ed Felten’s research on audio watermarking removal by RIAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By mistake, a friend sends sensitive health data in an email to you (wrong attachment). You should not read the information in the attached document because…

a) Professional code of ethics requires you to respect privacy of others.
b) You can be liable under CFAA

A

a) Professional code of ethics requires you to respect privacy of others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

US_CERT follows a responsible disclosure process for vulnerabilities reported to it. Such a process must…

a) Make the vulnerability information available to everyone who may be affected by it immediately
b) Provide a certain period of time for the vendor of the vulnerable system to develop a patch

A

b) Provide a certain period of time for the vendor of the vulnerable system to develop a patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A 2015 Pew surveyed American adults’ attitudes about privacy. What percentage feel that it is important that they be able to control who gets information about them?

a) About 50%
b) About 25%
c) Over 90%

A

c) Over 90%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which one is an example of information that Google decided not to return as a search result to meet the ECJ ruling?

a) Story about criminal conviction that was quashed on appeal
b) A doctor requesting removal of links to newspaper stories about botched procedures performed by him

A

a) Story about criminal conviction that was quashed on appeal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Electronic Frontier Foundation (EFF) ranks websites with privacy scores based on how they deal with issues related to privacy. It gave AT&T one of the lowest scores (1 out of 5 stars). What explains this low score?

a) Does not disclose data retention policies
b) Does not use industry best-practices
c) Does not tell users about government data demands

A

A and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does Google privacy policy disclose data retention policy?

a) Yes
b) No

A

b) No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Poor privacy is good for bad guys because they can use information about you to craft…

a) Targeted phishing attacks
b) Gain access to your online accounts

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The FTC charged Fandango for not protecting user privacy. This action was taken because Fandango…

a) Shared user data without informing users
b) Did not secure user data

A

b) Did not secure user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a company tracks your activities based on your machine’s IP address. One possible defense against it is…

a) Disable cookies
b) Use Tor

A

b) Use Tor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly