midterm Flashcards

1
Q

How does online communication challenge traditional legal structures?

A

It bypasses geographical and jurisdictional restraints, making enforcement of laws across borders difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key legal concerns in cybersecurity?

A

Jurisdictional fragmentation, lack of legal harmonization, and difficulties in attributing cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is cybercrime difficult to regulate internationally?

A

Different countries have varying legal definitions and laws related to cybercrime, making global cooperation challenging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who coined the term “cyberspace” and when?

A

William Gibson in 1982.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What makes cyberattacks difficult to attribute?

A

Anonymity, use of proxy servers, and techniques like botnets that disguise the origin of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is jurisdictional fragmentation a challenge in combating cybercrime?

A

Cybercrime is borderless, while legal systems are based on national sovereignty, creating enforcement gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three emerging cyber threats that require legal regulation?

A

Cybercrime, cyberwar, and cyberterrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Tallinn Manual?

A

A document outlining how international law applies to cyber warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does asymmetry in cyberspace contribute to cyber threats?

A

A small group or individual can launch large-scale cyberattacks without requiring extensive resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is the internet inherently vulnerable to cyberattacks?

A

Why is the internet inherently vulnerable to cyberattacks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of jurisdictional challenges in prosecuting cybercrime?

A

The 2001 “Love Bug” virus originated in the Philippines, but lack of local laws prevented prosecution or extradition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do cybercriminals use “slave” computers?

A

To disguise their location and make it harder to trace the attack back to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What factors make cyberspace difficult to regulate?

A

Global reach, anonymity, lack of borders, and decentralized structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which organizations and policies play a role in international cybersecurity regulation?

A

Cybersecurity Strategy of the European Union

EU Cybersecurity Act

ITU (International Telecommunication Union) Cybersecurity Strategy

ENISA (European Union Agency for Cybersecurity) Risk Management Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Budapest Convention on Cybercrime, and why is it important?

A

An international treaty aimed at harmonizing cybercrime laws, enhancing cooperation, and improving cybercrime investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the NIS 2 Directive, and what does it regulate?

A

An updated EU directive on network and information security, strengthening cybersecurity requirements for essential and important entities.

17
Q

What is the purpose of the EU General Data Protection Regulation (GDPR)?

A

To protect individuals’ personal data and privacy within the EU, setting strict rules on data processing and storage.

18
Q

What are the main cybersecurity threats according to ENISA?

A

Ransomware
Phishing attacks
Data breaches
Supply chain attacks
Insider threats

19
Q

What are the substantive aspects of cybercrime law covered in the course?

A

Definition and classification of cybercrimes
Criminal liability for cyber offenses
Legal frameworks governing cybercrime investigations

20
Q

What are the procedural aspects of cybercrime law?

A

Investigative procedures for digital crimes
Legal mechanisms for cross-border cooperation
Handling digital evidence and forensic procedures

21
Q

Why is jurisdictional fragmentation a challenge in cybersecurity law?

A

Because cybercrimes can be committed across borders, national laws often conflict, making enforcement and prosecution difficult.

22
Q

What is the role of ENISA in cybersecurity?

A

ENISA (European Union Agency for Cybersecurity) provides guidance, risk assessment frameworks, and cybersecurity policies for EU member states.

23
Q

What is the IBM X-Force Threat Intelligence Index, and why is it important?

A

A cybersecurity report analyzing global threat trends, vulnerabilities, and risks to help organizations enhance their defenses.

24
Q

What legal frameworks exist for cybersecurity in finance and AI sectors?

A

EU Artificial Intelligence Act
High-Level Expert Group on AI Ethics Guidelines
EBA Guidelines on ICT and Security Risk Management

25
Q

What is cyber risk management, and why is it important?

A

A process of identifying, analyzing, and mitigating cybersecurity risks to protect critical infrastructure and sensitive data.

26
Q

What are the key aspects of cybersecurity incident management?

A

Incident classification
Threat detection
Incident response and reporting
Mitigation strategies

27
Q

What are ICT third-party risks, and why must they be managed?

A

Risks arising from outsourcing IT services or using third-party vendors, which can introduce vulnerabilities into an organization’s network.

28
Q

What is the responsibility of private entities in cyber operations?

A

Private organizations must ensure cybersecurity compliance, protect user data, and report cyber incidents as required by regulations.