Surveillance Flashcards

1
Q

What does the Information Commissioner Code attempt to balance?

A

Legit desire of employees for privacy and legit desire of employers to run their business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What did data protection act ensure

A

All information about citizens would only be used for the purposes for which they gave it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the Communications Act make illegal?

A

Using other wifi networks without permission

Sending obscene messages

Using tech to cause anxiety / persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the Privacy & Electronic Communications Regulations protect?

A

A citizen’s right to ‘privacy’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is RIPA concerned with?

A

Regulating the powers of public bodies to carry out surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the IPA try to do?

A

Prohibit interception of communications without lawful authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ‘Cyber-enabled crime’

A

Traditional crimes conducted online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ‘Advanced cybercrime’

A

Attacks against hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who are today’s attack sources?

A

Highly complex global networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybercrime is four things. What are they?

A

Fast
Anonymous
Convenient
Transnational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define malware

A

A program that is covertly inserted into another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the intent of malware?

A

Destroy data
Run intrusive or destructive programs
To compromise confidentiality or integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an APT

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What three things does a Virus have?

A

Infection mechanism
Trigger
Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a infection mechanism

A

how virus spreads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four phases of virus life?

A

Dormant phase
Propagation phase
Triggering phase
Execution phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

define dormant

A

virus idle

18
Q

define propagation

A

virus spreading

19
Q

define trigger

A

virus activated

20
Q

define payload

A

virus does its thing

21
Q

how is a virus classified?

A

by target or concealment strategy

22
Q

Define worm

A

Program that to infect more machines and acts as launching pad for attacks on other systems

23
Q

4 examples of worm propagation

A

email
IM
file sharing
through a network

24
Q

what is a muliplatform worm?

A

worm can attack various OS (windows/linux)

25
Q

what is multi-exploit worm?

A

worm penetrates in different ways

26
Q

what is ultrafast worm?

A

attempt to optimise rate of propagation?

27
Q

what is polymorphic worm?

A

worm generates new code in flight

28
Q

what is metamorphic worm

A

worm behaves differently at different stages of propagation

29
Q

what is zero day exploit?

A

worm exploits unknown vulnerability for surprise

30
Q

What three offences did Computer Misuse Act define?

A

Unauthorised access to computer material

Unauthorised access with intent to commit or facilitate further offences

Unauthorised modication of computer material

31
Q

A person is guilty of an offence in the Computer Misuse Act if what:

A

he causes a computer to perform a function to secure access to any program or data

the access is unauthorised

they know this to be the case

32
Q

What things were changed in Police and Justice Bill?

A

Max penalty for unauthorised access = 6 -> 12 months

Impairing operation of a computer = max penalty 12 months

Now an offence to make, adapt or supply tools to commit offence

33
Q

What does Directive on Security of Network and Information Systems attempt to do?

A

Improved cybersecurity at national level

Increased cross border cooperation

34
Q

List some legislation limits

A

Legislation gets out of date

Government criticised for placing responsibility for security on individuals

UK is limited to tackle something international

35
Q

What is the ‘general’ concern with data and privacy?

A

There’s now so much data. How is it being kept safe? What rights do you have over it? Can you live off the grid? Can you consciously remove yourself from the datasets that are being collected on you?

36
Q

What things can employers look at?

A

Emails
Telephone messages
Security cameras
Personal data on employees

37
Q

When is surveillance in workplace allowed?

A

Detecting crime
To comply with regulation
Staff quality control

38
Q

What is the main law concerned around surveillance in the workplace?

A

Information Commissioner Code on monitoring at work

39
Q

What does the ICO monitoring at work recommend for employees?

A

Employees are entitled to some privacy
Methods to surveil should not be intrusive
Covert monitoring should happen for crime detection

40
Q

What are the five laws related to privacy and computer misuse? (Alphabetical order)

A

Communications act

Data protection act

Investigatory Powers Act

Privacy and Electronic Communications Regulations

Regulation of Investigatory Powers Act

41
Q

What does RIPA provide rules about?

A

Interception of communications
Getting data relating to communications
Carrying out snooping

42
Q

What is significant about the Investigatory Powers Act?

A

It also covers interception of messages prior to transmission as well as after.

Significance: a message that hasn’t been sent could still be used as evidence against a person.