Surveillance Flashcards
What does the Information Commissioner Code attempt to balance?
Legit desire of employees for privacy and legit desire of employers to run their business
What did data protection act ensure
All information about citizens would only be used for the purposes for which they gave it
What does the Communications Act make illegal?
Using other wifi networks without permission
Sending obscene messages
Using tech to cause anxiety / persistence
What does the Privacy & Electronic Communications Regulations protect?
A citizen’s right to ‘privacy’
What is RIPA concerned with?
Regulating the powers of public bodies to carry out surveillance.
What does the IPA try to do?
Prohibit interception of communications without lawful authority
Define ‘Cyber-enabled crime’
Traditional crimes conducted online
Define ‘Advanced cybercrime’
Attacks against hardware and software
Who are today’s attack sources?
Highly complex global networks
Cybercrime is four things. What are they?
Fast
Anonymous
Convenient
Transnational
Define malware
A program that is covertly inserted into another program
What is the intent of malware?
Destroy data
Run intrusive or destructive programs
To compromise confidentiality or integrity of data
What is an APT
Advanced Persistent Threats
What three things does a Virus have?
Infection mechanism
Trigger
Payload
What is a infection mechanism
how virus spreads
What are the four phases of virus life?
Dormant phase
Propagation phase
Triggering phase
Execution phase
define dormant
virus idle
define propagation
virus spreading
define trigger
virus activated
define payload
virus does its thing
how is a virus classified?
by target or concealment strategy
Define worm
Program that to infect more machines and acts as launching pad for attacks on other systems
4 examples of worm propagation
email
IM
file sharing
through a network
what is a muliplatform worm?
worm can attack various OS (windows/linux)
what is multi-exploit worm?
worm penetrates in different ways
what is ultrafast worm?
attempt to optimise rate of propagation?
what is polymorphic worm?
worm generates new code in flight
what is metamorphic worm
worm behaves differently at different stages of propagation
what is zero day exploit?
worm exploits unknown vulnerability for surprise
What three offences did Computer Misuse Act define?
Unauthorised access to computer material
Unauthorised access with intent to commit or facilitate further offences
Unauthorised modication of computer material
A person is guilty of an offence in the Computer Misuse Act if what:
he causes a computer to perform a function to secure access to any program or data
the access is unauthorised
they know this to be the case
What things were changed in Police and Justice Bill?
Max penalty for unauthorised access = 6 -> 12 months
Impairing operation of a computer = max penalty 12 months
Now an offence to make, adapt or supply tools to commit offence
What does Directive on Security of Network and Information Systems attempt to do?
Improved cybersecurity at national level
Increased cross border cooperation
List some legislation limits
Legislation gets out of date
Government criticised for placing responsibility for security on individuals
UK is limited to tackle something international
What is the ‘general’ concern with data and privacy?
There’s now so much data. How is it being kept safe? What rights do you have over it? Can you live off the grid? Can you consciously remove yourself from the datasets that are being collected on you?
What things can employers look at?
Emails
Telephone messages
Security cameras
Personal data on employees
When is surveillance in workplace allowed?
Detecting crime
To comply with regulation
Staff quality control
What is the main law concerned around surveillance in the workplace?
Information Commissioner Code on monitoring at work
What does the ICO monitoring at work recommend for employees?
Employees are entitled to some privacy
Methods to surveil should not be intrusive
Covert monitoring should happen for crime detection
What are the five laws related to privacy and computer misuse? (Alphabetical order)
Communications act
Data protection act
Investigatory Powers Act
Privacy and Electronic Communications Regulations
Regulation of Investigatory Powers Act
What does RIPA provide rules about?
Interception of communications
Getting data relating to communications
Carrying out snooping
What is significant about the Investigatory Powers Act?
It also covers interception of messages prior to transmission as well as after.
Significance: a message that hasn’t been sent could still be used as evidence against a person.