Legal, Regulations, Investigations and Compliance Flashcards
Breach of data security
attackers alter or compromise the static data store on computers
breach of physical security
attackers intercept communications lines and listen to sensitive conversation or gain access to documents in the trash.
breach of communication security
attackers use malicious code to crack the integrity and confidentiality of digitally transmitted information.
breach of operations security
attackers compromise day to day processes or procedures through methods such as IP spoofing
breach of personnel security
attackers gain information from company employees
Covers individual and business rights and obligations under the law.
torte law
Combines aspects of two or more legal systems
mixed law
derives from the broad legal principals and the interpretation of doctrinal writings
civil law
Regulates organizations and their employees using a system of punishment
administrative law
Responsible for maintaining peace and order among a population
criminal law
covers all aspect of social and spiritual behavior within society.
religious law
4 categories of computer crimes
computer as the target
computer as the instrument
computer as incidental to other crimes
crimes associated with the prevalence of computers
Computer as the target category
involve sabotage of computers and networks
stealing information
Computer as the instrument category
computer used as a means to create chaos
computer as incidental to other crimes category
computers aren’t essential for the crimes, just facilitate
crimes associated with the prevalence of computers
software piracy
stealing computer equipment
Breach of physical security
involves a breach in the actual hardware that makes up the system, network, or building
dumpster diving
wiretapping
shoulder surfing
breach of personnel security
attackers trick employees
breach of communications security
unauthorized people use digital communication lines to compromise the integrity and confidentiality of information transmitted between authorized parties. trap doors tunneling timing virus/worm/trojan salami
salami attack
attacker takes a small amount of money from a large quantity of individuals
breach of data security
attackers alter or compromise the static data stored on computers.
breach of operations security
attackers take advantage of day to day processes or procedures IP spoofing password sniffing scanning excess privileges data diddling
Data diddling
an attacker alters data either when it is entered or soon after the data is processed by the application and is ready for output.
civil law
basis of legal system in Europe
based on Roman law
derives from broad legal principles and the interpretation of doctrinal writings
common law
depends on judicial decisions that were based on tradition, custom, and precedent.
Criminal codes dealing with computer crimes
18 USC 1029
18 USC 1362
18 USC 2510
18 USC 3121
Laws dealing with privacy
Federal Privacy Act
HIPPA
Gramm-Leach-Bliley
direct evidence
eyewitness statement
demonstrative evidence
chart used to explain a concept to a jury
documentary evidence
printed transcripts of telephone conversations
real evidence
perishable object capable of reproduction
5 evidence life cycle stages
collection and identification analysis storage, preservation, and transportation court presentation return to owner
definition of due care
an organization takes all reasonable steps to protect against security breaches