Module 2 - Laws Impacting Computer Systems and Usage Flashcards

1
Q

Computer Fraud and Abuse Act of 2002 (goal)

A

Protect computers “with a compelling federal interest” with:

1) federal government
2) financial institutions
3) Interstate and foreign commerce (as well as communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Fraud and Abuse Act of 2002 (Definition of Access Violations)

A
  • Outsider trespasses into a computer from 1 of the 3 categories of protected systems
  • A user goes beyond his/her scope of authorization and accesses systems and info. he/she should not.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer Fraud and Abuse Act of 2002 (7 Violations)

A

1) trespassing
2) exposing certain info
3) damaging a system (of 3 protected)
4) committing fraud
5) threatening to damage a protected computer system
6) trafficking in passwords
7) committing (or attempting to commit) espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Violations of CFAA for Forensic Examiners

A

may have permission to examine with appropriate authority, but should be aware of civil penalties if system damaged or data is exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sarbanes-Oxley Act of 2002 (goal)

A

help prevent corporate corruption and fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sarbanes-Oxley Act of 2002 (what it does)

A

establishes retention records for key info within org, e.g. e-mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sarbanes-Oxley Act of 2002 (Email Requirements)

A

Must be:

1) tamper-proof (password protected, read-only, non-deletable, encrypted, and digitally signed)
2) stored in online and offline systems
3) defined and retained by established business policies
4) fully indexed and searchable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does learning laws help us?

A
  • be prepared to answer questions about what information is available
  • how a system was compromised
  • what was destroyed
  • what controls did and did not work
  • monetary estimate of damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CFAA (Definition of Computer)

A
Defined as:
electronic
magnetic
optical
electrochemical
high speed data processing device (performing logical, arithmetic, or storage functions and includes a data storage facility or communications facility directly operating in conjunction with such device)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CFAA (Protected Computer)

A

1) federal government
2) financial institutions
3) Interstate and foreign commerce (as well as communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State

A

includes the District of Columbia, the Commonwealth of Puerto Rico, and any other commonwealth, possession or territory of the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Financial Institution

A
  • institution with FDIC insured deposits
  • Federal Reserve
  • credit union
  • Federal home loan bank system
  • Farm Credit System
  • registered with SEC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CFAA terms: Financial Record, Exceeds Authorized Access, Department of the US, Damage

A

damage = impairment to integrity or availability of program,system, or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CFAA term: Conviction

A
  • punishable by imprisonment for more than 1 year, an element of which is unauthorized access, or exceeding authorized access to a computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Elements of Loss under CFAA

A
  • any reasonable cost to any victim:
cost of responding
conducting damage assessment
restore data
revenue lost
cost incurred
consequential damages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Person under CFAA

A

any individual, firm, corporation, educational institution, financial institution, governmental entity, or legal or other entity

17
Q

CFAA (acts of abuse)

A
  • trespassing
  • exposure of information
  • damaging computer
  • committing fraud
  • threatening to damage
  • trafficking in passwords
  • accessing computer to commit espionage
18
Q

CFAA (Access Violations - means of)

A
  • An outsider, who trespasses into a computer

- A user, who goes beyond the scope of their authorization.

19
Q

CFAA (elements of Trespassing in Government Cyberspace)

A

intentionally AND without authorization

computer exclusively for the use of the Government OR is by or for Government and affects that use

20
Q

CFAA Roles for Law Enforcement

A

USSS - investigate offenses
FBI - investigate for espionage, foreign counterintelligence, info protected against unauthorized disclosures, restricted data

21
Q

CFAA and civil

A

may maintain a civil actions against violator

must allege:
damage or loss
caused by
violation of substantive provisions
conduct involving one of the factors
22
Q

Uses of CFAA

A
US v Morris
International Airport Centers, LLC
Robbins v. Lower Merion School District
Massachusetts Bay Transportation Authority v. Andersen, et. al.
US v. Neil Scott Kramer
23
Q

Sarbanes-Oxley Act

A

reaction to a number of major corporate and accounting scandals including

internal controls (accounting and financial reporting)
records must be retained
24
Q

Sarbanes-Oxley Act Penalities

A

Section 802

  • up to 20 years imprisonment for altering, deleting data
  • up to 10 years on any accountant who violates requirements of audit or review papers for a period of 5 years.