Lecture 12 Flashcards

Legal & Ethical issues

1
Q

Laws that keep society safe.

A. Criminal
B. Civil
C. Administrative

A

A. Criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Laws designed to provide for an orderly society. Authorities do not get involved.

A. Criminal
B. Civil
C. Administrative

A

B. Civil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Laws enacted as policies, procedures and regulations that govern the daily operations of the agency. Published by Code of Federal Regulations (CFR).

A. Criminal
B. Civil
C. Administrative

A

C. Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access classified or financial info without authorizations.
Access computer used by federal government.
Use federal computer to perpetrate a fraud.
What law covers the above?

A. Computer Security Action of 1987 (CSA)
B. Computer Fraud and Abuse Act of 1984 (CFAA)
C. Government Information Security Reform Act of 2000

A

B. Computer Fraud and Abuse Act of 1984 (CFAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amendments to the CFAA in 1994 include what?

A

Creation of any type of malicious code that might cause damage to a computer system
Covers interstate transactions
Imprisonment of offenders
victim can pursue civil action for compensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What law mandates the baseline security requirements for all federal agencies?

A. Computer Security Action of 1987 (CSA)
B. Computer Fraud and Abuse Act of 1984 (CFAA)
C. Government Information Security Reform Act of 2000

A

A. Computer Security Action of 1987 (CSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This law amends the United States Code to provide framework for establishing effective controls over IT resources, define security management measures, provides government-wide management and oversight of IT security risks. Defines mission-critical systems.

A. Computer Security Action of 1987 (CSA)
B. Computer Fraud and Abuse Act of 1984 (CFAA)
C. Government Information Security Reform Act of 2000

A

C. Government Information Security Reform Act of 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ are the intangible assets such as copyrights, trademarks,patents,trade secrets.

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ law protects against unauthorized duplication of an owners original work.

A

copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ________ prohibits attempts to circumvent copyright protection mechanisms and limits the liability of ISP when their facilities are used by criminals violating copyright laws.

A

Digital Millennium copyright act (DMCA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ______ is used to identify a company and its products/services. Such as slogans and logos.

A

trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ protect the intellectual property rights of inventors.

A

patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ are processes or other info a company wants to keep secret. (ingredients, blue prints, business plans, etc.)

A

trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The _____ has 2 major provisions: if found guilty of stealing trade secrets from a US corp. w/intention of benefiting a foreign government may be fined up to $500,000 and imprisoned up to 15 years, and other circumstances fined up to $250,000 and imprisoned up to 10 years.

A

Economic Espionage Act of 1996

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 types of license agreements?

A

Contractual - written contract between vendor & customer
Shrink wrap- written on outside of package
Click wrap- click a button to agree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ is a complex set of regulations governing the export of sensitive hardware and software.

A

export controls

17
Q

The ____ privacy regulations concerns the services of financial institutions and how they could share info among each other.

A

Gramm-Leach-Bliley Act of 1999

18
Q

What are the types of evidence?

A

Real
documentary
testimonial

19
Q

Admissible evidence is what?

A

relevant (to determining a fact)
material (related to the case)
competent (obtained legally)

20
Q

A(n) _____ refers to any occurrence that takes place during a certain period of time.

A

Event

21
Q

A(n) ____ is an event that has a negative outcome affecting the CIA of an organization’s data/systems.

A

Incident

22
Q

The first step in the Incident Response process is what?

A

Incident detection and identification

23
Q

In Incident Response, the sub-steps in response and reporting include what?

A

isolate and contain
gather evidence
analyze and report