Web Security, and Security Management, Law, Ethics, and Privacy Flashcards
Risk Likelihood
Configuration Management
concerned with specifically keeping track of the
configuration of each system in use and the changes made to each. This includes lists
of the hardware and software versions installed on each system. This information
is needed to help restore systems following a failure (whether security related or
not) and to know what patches or upgrades might be relevant to particular systems.
Change Management
Security Compliance
Maintenance
Risk
(prob that threat occurs) * (cost to org)
DMCA Exemptions
Fair Use
Reverse Engineering
Encryption Research
Security Testing
Personal Privacy
European Union Data Protection Directive
Notice
Consent
Consistency
Access
Security
Onward Transfer
Enforcement
US Privacy Act of 1974
- Permit individuals to determine what records pertaining to them are collected, maintained, used, or disseminated.
- Permit individuals to forbid records obtained for one purpose to be used for another purpose without consent.
- Permit individuals to obtain access to records pertaining to them and to correct and amend such records as appropriate.
- Ensure that agencies collect, maintain, and use personal information in a manner that ensures that the information is current, adequate, relevant, and not excessive for its intended use.
- Create a private right of action for individuals whose personal information is not used in accordance with the Act
Patents
- Utility patents: May be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof;
- Design patents: May be granted to anyone who invents a new, original, and ornamental design for an article of manufacture; and
- Plant patents: May be granted to anyone who invents or discovers and asexually reproduces any distinct and new variety of plant.