PIC9-13 Flashcards

1
Q

IBM’s Resource Access Control Facility (RACF)

A

very powerful main mainframe security utility available before remote access era

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercrime

A

criminal activity in which computers or computer networks are a tool, a target or a place of criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computers as targets of cybercrime

A
  • information acquisition
  • control the system without authorization or payment
  • alter integrity of data
  • interfere with system availability (hacking or denial of service)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer as a storage device in cybercrime

A

use of computer as a passive storage medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computers as communication tools in cybercrime

A

traditional crimes committed online, e.g.:
illegal sales of drugs and arms online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced fee fraud

A

promise of large sums of money if they provide relatively small payments upfront

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bots

A

piece of malware that carries out certain actions on receiving a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DOS

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hack

A

unauthorised entry to a computer, network or website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

trick to elicit confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

use of social factors to persuade a victims to reveal information of give money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spam

A

bulk sending of emails ot other messages to users

commercial misuse

“black hat marketing”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

program covertly inserted into another program:
- destroy data
- run malicious programs
- compromise confidentiality, integrity or availability of system, data, applications

classified by method of spread and payload (actions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

malware that facilitates unauthorised access to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkit

A

malware that enables access while hiding its presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus

A

malware that infects a host program and propagates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Worm

A

Malware that does not need a host program to propagate. infects via network, usb stick, etc…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Zombie

A

Computer that has been compromised and is used to perform malicious tasks under remote control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ransomware

A

criminal activity where a victim is held to ransom by cybercriminals:
- hacker asks for money in exchange of removing a malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WannaCry

A

Ransomware attack to NHS in 2017 targeting Windows computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virus components

A
  • infection mechanism
  • trigger
  • payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Virus lifetime phases

A
  • dormant
  • propagation
  • triggering
  • execution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cross site request forgery

A

sea surf

third party cookie setting, usually without the user being aware of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloaking

A

SEO technique in which the content presented to the search engine spider is different to that presented to the user browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Advanced Persistent Threat

A
  • usually part of state security
  • systematic and repeated cybercrime
  • political or economic motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Sandworm

A

Russian Advanced Persistent Threat group responsible for hacker attack to Ukraine power grid in 2017

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Stuxnet

A

Advanced Persistent Threat Attack to Iran’s nuclear plant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Computer Misuse Act 1990

A

Offences:
- Unauthorised access to computer material
- Unauthorised access with intent of further offences
- Unauthorised modification of computer material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

EU Directive on Security of Network and Information Systems (2016)

A

first EU rules on cybersecurity

  • improved cybersecurity capabilities
  • increased EU-level cooperation
  • risk management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Challenges in combatting cybercrime

A
  • technology evolves fast and legislation becomes out of date
  • malware evolved quickly
  • individuals poor security practice
  • Limitation of legislations on
    cybercrime coming from abroad
  • difficulty to link anti-cybercrime initiatives across jurisdictions
  • complexity of tech
  • cooperation of law enforcement agencies internationally
  • low investment in preventive tech
  • unreported cybercrime to avoid bad publicity and liability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Digital Forensic Evidence

A
  • evidence that results from digital investigation
  • must be preserved
  • used for trials
  • investigation should not modify the state of the computer
32
Q

IS contracts

A
  • build bespoke software
  • licence agreement
  • consulting
  • outsourcing
33
Q

Fixed Price contract

A
  • fixed amount agreed for the complete work
  • supplier takes most of the risk
  • functional specs and change control very important
34
Q

Time and materials contract

A
  • Payment based on hours of work and expenses
  • More typical for consultancy than software development
  • Risks shared between client and supplier
35
Q

Typical software contract structure

A
  • Short agreement
  • Standard terms and conditions
  • Schedules or annexes (Statement of Work)
36
Q

Bespoke Software Contract - Schedule of Work

A
  • parties and context agreement
  • deliverables definition
  • who will do what
  • timescales
  • payment schedules
  • User Acceptance Testing definition
  • Change control definitions
  • Exclusions
37
Q

Bespoke Software Contract - Governance

A
  • Design and delivery methodology
  • QA methods
  • Meetings and reporting
  • Project managers and client contracts
  • Escalation procedures
38
Q

Bespoke Software Contract - Deliverables

A
  • usually an installed system
  • documentation and code
  • design, testing, training
39
Q

Bespoke Software Contract – Requirements and Change Control

A
  • Functional Specs or Prioritised Requirements List
  • Non-functional requirements: performance, security, availability
  • Change control mechanism
40
Q

Bespoke Software Contract - Ownership

A
  • Contract should state legal rights of parties at the end of project
  • Intellectual property usually assigned to the client
  • Exception for open source or proprietary software used in the solution
  • IP for specific methodology/process used in development retained by the supplier
41
Q

Bespoke Software Contract - Confidentiality

A
  • may include NDA
  • may include clauses on promotional purposes
42
Q

Bespoke Software Contract - Payment

A
  • Typically within 30 days of invoice
  • termination or surcharge upon delay
  • staged payment usual
43
Q

Bespoke Software Contract - Penalties

A
  • may specify penalty charges for delay on delivery schedule
  • suppliers often inflate costs to cover for potential penalty costs
  • serious delays can lead supplier to walk away
  • over-runs reduce profit margins
  • clients can fail to meet obligations on time
  • extra charges usually agreed at progress meetings. Disagreements lead to legal disputes
44
Q

Bespoke Software Contract – Customer Obligations

A
  • documentation of project activities
  • access to relevant staff
  • machine facilities, network links, etc.
  • on site facilities and support
  • timely sign-off of deliverables
  • specs and execution of user acceptance tests
45
Q

Bespoke Software Contract – Acceptance and Warranty

A
  • usually defined at the outset
  • client should provide fixed set of UAT and expected results from the start. can’t add test later
  • warranty period usually 90 days, within which errors corrected free of charge
  • subsequent maintenance on a time and material basis
46
Q

Bespoke Software Contract – Other Clauses

A
  • indemnity of parties against liability of for infringing third party rights
  • termination rules set in advance
  • arbitration decisions
  • applicable law citation
47
Q

IT consultancy contact

A
  • Contact Hire involves supplying staff to client
  • consultancy involves to assignment to complete a specific engagement
  • contracts terms can be similar to bespoke contracts
  • delivery is often a report or presentation
  • payment usually on time and material
48
Q

IT Outsourcing contract

A
  • services to be provided
  • SLA
  • Payments
  • demarcation of responsibilities between client and supplier
  • may involve transfer of staff and assets from client to supplier
  • specify termination conditions
49
Q

Why defects occurr

A
  • complexity of systems
  • subsystems come from different suppliers
50
Q

number of software defects in code

A

15-50 errors per 1000 lives of code (defects/KLOC)

Microsoft:
- 10-20 defects/KLOC in-house testing
- 0.5 defects/KLOC in production

51
Q

Types of software defects

A
  • functionality fail
  • performance fail
  • incompatibility
  • difficulty to maintain
  • hidden bugs
52
Q

Impact of software defects

A
  • can be life threatening
  • can present security risks
  • can have large economic implications
53
Q

Liability for software failure

A

topics of discussion:
- increased liability stifles software products?
- increased liability discourage development in high risk fields?
- programmers subject to malpractice suits?
- should IS professionals be obliged to buy professional indemnity insurance?

54
Q

Legislation for software defects

A

Under UK/EU law, software is categories as a product

55
Q

Consumer Rights Act 2015

A
  • give rights to a repair or replacement of digital products
  • first time consumers have rights for digital content (films, games, music)
56
Q

Limitation to liability for computer software

A
  • contracts may contain clauses limiting liability for defective software
  • floodgate risk: if software is faulty, it can lead to u limited liability through widespread use
57
Q

Liability for AI

A

proposed by EU

assigns application of AI to three risk categories:

  • applications that create unacceptable risk are banned (social scoring of the type used in China)
  • high-risk applications like cv scanner are subject to specific legal requirements
  • non banned nor high risk apps are left unregulated
58
Q

Open source software - limit of liability

A

developer not liable for any damage, except when someone is hurt or killed

59
Q

Intellectual Property

A
  • creative works, inventions and commercial goodwill
  • has value
  • intangible
  • can be stolen
  • law for protecting it is different from physical property
60
Q

Why do we need protection fo Intellectual Propery

A
  • reward creators
  • allow creators to control use
  • to encourage creativity
61
Q

Intellectual Property Rights

A
  • IPO (Intellectual Property Officer) in UK
  • Copyright (protects creative work)
  • Patent (protects inventions)
  • Trademark (protects product names, logos, symbols)
62
Q

Copyright

A
  • work must be original
  • Idea must be expressed
63
Q

Copyright - international applications

A
  • Berne Convention (basic definition of copyright
  • World Trade Organisation
  • World International Property Office (digital environment)
64
Q

EU and UK legislations

A

EU various directives
- term (duration)
- infosoc (online, e.g.: downloads)
- software
- database

UK Copyright, Design and Patents Act 1998

65
Q

Rights of Copyright Owner

A
  • Give copies of work to public
  • Give permissions to make copies
  • Give permissions to adapt a work
  • Make variations or derivatives of a work
  • Sell or licence rights
66
Q

Duration of Copyright

A
  • 70 years after death of last author (principal autor, director, composer for film)
  • radio: 50 years after first broadcast
  • Crown: 125 after work created
67
Q

Fair Dealing (exceptions, Infosoc)

A

include:

  • Research
  • criticism, review, quotation, news reporting
  • caricature, parody
  • teaching
  • library, archives, museums can make copies
68
Q

EU Directive 2019 (DSM Copyright Directive)

A
  • access subscriptions across borders
  • improves rules on research, education and inclusion of disabled people
  • sustainable marketplace for content creators and press
69
Q

Software and Copyright

A
  • In most countries software is protected as literary work. Includes source code, object code
  • non-literal elements are not protected: UI, calculations, functions
70
Q

Software copyrights - Author

A
  • in a company, the employer owns the copyright
  • independent contractors can pass copyrights to employer in formal agreement
  • author can assign copyright to third parties
71
Q

Software Copyright - commercial software

A
  • customer buys licence to use, not the actual software
  • owner retains copyright
  • tailor made software: fist owner is the creator
  • customer gets the copyright
  • except for elements that are proprietary, open source or belong to third party
72
Q

Software copyright - rights of others

A
  • can’t prevent other to come up with the same code without copying
  • legal to keep a back-up copy
  • legal to decompile to find errors or determine interface
73
Q

Open Source

A
  • free in terms of freedom, not price
  • Open Source Initiative: motivation is reliability and flexibility
  • Free Software Foundation: freedom for computer users
  • allow to:
    Study and modify program
    Redistribute copies
    Distribute modified versions
74
Q

Copyleft

A

method for making a program free and requiring all modified and extended versions to be free as well

75
Q

Database directive

A
  • Database is defined as a collection of independent work arranged in a systematically way
  • rights apply if there has been a substantial investment in obtaining, verifying or presenting the content
  • rights last 15 years
  • rights allow creators to prohibit extraction and re-use of content
  • applies to extraction of substantial quantities