1 Flashcards
1 (60 cards)
What is the primary focus of information security in the modern digital era?
Governed by legal, ethical, and professional standards.
What does the legal aspect of information security protect against?
Cyber threats, ensuring compliance and accountability.
What role do ethics play in information security?
Guide professionals in responsible decisions regarding data privacy and cybersecurity practices.
What is professionalism in the context of information security?
Maintaining integrity, competence, and a duty to protect information assets.
What are the potential consequences of unethical behavior in cybersecurity?
Legal consequences, financial damage, reputational harm, operational disruption.
What law can lead to criminal charges for unauthorized access (hacking)?
Computer Fraud and Abuse Act (CFAA).
What can data breaches due to negligence result in?
Heavy fines under laws like HIPAA or GDPR.
What is ethical hacking?
Legally authorized practice of probing systems to identify vulnerabilities.
What are ethical hackers also known as?
White-hat hackers.
What is the intent of unethical hacking?
Stealing data, causing harm, or disrupting operations.
Who are black-hat hackers?
Hackers engaged in unauthorized access with malicious intent.
What is penetration testing?
Simulating cyberattacks to find and fix weaknesses.
What is a bug bounty program?
Companies reward ethical hackers for reporting security flaws.
What does the GDPR stand for?
General Data Protection Regulation.
What is the purpose of the GDPR?
Protect the privacy and personal data of EU citizens.
What is a key provision of the GDPR?
Companies must report data breaches within 72 hours.
What does the Digital Millennium Copyright Act (DMCA) protect against?
Digital piracy and unauthorized access to copyrighted material.
What is one notable case associated with the CFAA?
Aaron Swartz Case (2011-2013).
What is the purpose of the U.S. Electronic Communications Privacy Act (ECPA)?
Regulate government and private surveillance of electronic communications.
What is one example of unethical hacking?
Ransomware attacks.
Fill in the blank: Ethical hackers use their skills to ______.
strengthen security and prevent breaches.
Fill in the blank: Unauthorized access to systems is characteristic of ______ hacking.
unethical.
True or False: Ethical hacking requires authorization from the system owner.
True.
True or False: Black-hat hackers act within legal and ethical boundaries.
False.