Law Ethics and Privacy Flashcards

1
Q

Technology and other safeguards for cyber security are largely defensive in nature. The only way they can impact a threat source is by increasing the work factor for an attacker. Can laws be used to reduce the magnitude of threats?

A) YES, laws can provide criminal sanctions agains those who commit cyber crime

B) NO, cyber crime has increased even as new laws have been put in place

A

A) YES

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber crime is a big problem. According to a recent report, what is an estimate of the cost of cybercrime for the United States?

A) 10 billion dollars
B) over 100 billion dollars

A

B) Over 100 billion dollars

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Computer Fraud and Abuse Act (CFAA) was used to prosecute the creator of the Melissa virus and he was sentenced in a federal prison and fined by using its provisions. What abuse was perpetrated by the Virus?

A) Data stored on computers was destroyed

B) Denial of service attacks that made computers unusable

A

B) Denial of service attacks that make computers unusable

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Several people have argued about the overly general and vague language of the CFAA. For example, how exactly is unauthorized access defined? In one case, a company sued its competitor because the competitor’s employees create a trial subscription and downloaded data that was available to its subscribers. Do you think this is a violation of unauthorized access?

A) No, because the data was publicly available

B) Yes, because it potentially can cause financial loss to the company that sued its competition

A

A) No, because the data was publicly available

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The DCMA includes exclusions for researchers, but companies have threatened to sue researchers who wanted to publish work related to circumvention of anti-piracy technologies. Which of these is an example of such a threat under the DCMA:

A) Prof. Ed Felten’s research on audio watermarking removal by RIAA

B) A research project done by MIT students that found vulnerabilities in the MBTA

A

A) Prof. Ed Felten’s research on audio watermarking removal by RIAA

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By mistake, a friend sends sensitive health data in an email to you (wrong attachment). You should not read the information in the attached document because:

A) Professional code of ethics requires you to respect the privacy of others

B) You can be liable under CFAA

A

A) Professional code of ethics requires you to respect privacy of others

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

US_CERT follows a responsible disclosure process for vulnerabilities reported to it. Such a process must:

A) Make vulnerability information available to everyone who may be affected by it immediately

B) Provide a certain period of time for the vendor of the vulnerable system to develop a patch

A

B) Provide a certain period of time for the vendor of the vulnerable system to develop a patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A 2015 Pew survey of American adults’ attitudes about privacy. What percentage feel that it is important that they be able to control who gets information about them

A) 50%
B) 25%
C) 90%

A

C) 90%

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In 2014, the European Court of Justice ruled that EU citizens have the “right to be forgotten” on the internet. For example, Google must not return links to information that can be shown to be “inaccurate, inadequate, irrelevant, or excessive”. Which one of the following is an example of information that Google decided not to return as a search result to meet the ECJ ruling?

A) Story about criminal conviction that was quashed on appeal

B) A doctor requesting removal of links to newspaper stories about botched procedures performed by him

A

A) Story about criminal conviction that was quashed on appeal

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Electronic Frontier Foundation (EFF) ranks websites with privacy scores based on how they deal with issues related to privacy. It gate AT&T one of the lowest scores (1 out of 5 scores). What explains this low score?

A) Does not disclose data retention policies

B) Does not use industry best-practices

C) Does not tell users about government data demands

A

A) does not disclose data retention policies

and

C) Does not tell users about government data demands

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does Google’s privacy policy disclose data retention policy?

A

No

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Poor privacy is good for bad guys because they can use information about you to craft:

A) targeted phishing attacks

B) Gain access to your online accounts

A

A & B

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The FTC charged Fandango, the online move ticket purchasing company, for not protecting user privacy. This action was taken because Fandango:

A) Shared user data without informing users

B) Did not secure user data

A

B) did not secure user data

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a company tracks your activities based on your machine’s IP address, on possible defense against it is to:

A) Disable cookies

B) Use Tor

A

B) Use Tor

P3L3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly