1 Flashcards

1 (60 cards)

1
Q

What is the primary focus of information security in the modern digital era?

A

Governed by legal, ethical, and professional standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the legal aspect of information security protect against?

A

Cyber threats, ensuring compliance and accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What role do ethics play in information security?

A

Guide professionals in responsible decisions regarding data privacy and cybersecurity practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is professionalism in the context of information security?

A

Maintaining integrity, competence, and a duty to protect information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the potential consequences of unethical behavior in cybersecurity?

A

Legal consequences, financial damage, reputational harm, operational disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What law can lead to criminal charges for unauthorized access (hacking)?

A

Computer Fraud and Abuse Act (CFAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can data breaches due to negligence result in?

A

Heavy fines under laws like HIPAA or GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ethical hacking?

A

Legally authorized practice of probing systems to identify vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are ethical hackers also known as?

A

White-hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the intent of unethical hacking?

A

Stealing data, causing harm, or disrupting operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who are black-hat hackers?

A

Hackers engaged in unauthorized access with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is penetration testing?

A

Simulating cyberattacks to find and fix weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a bug bounty program?

A

Companies reward ethical hackers for reporting security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the GDPR stand for?

A

General Data Protection Regulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the GDPR?

A

Protect the privacy and personal data of EU citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a key provision of the GDPR?

A

Companies must report data breaches within 72 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the Digital Millennium Copyright Act (DMCA) protect against?

A

Digital piracy and unauthorized access to copyrighted material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is one notable case associated with the CFAA?

A

Aaron Swartz Case (2011-2013).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the U.S. Electronic Communications Privacy Act (ECPA)?

A

Regulate government and private surveillance of electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is one example of unethical hacking?

A

Ransomware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fill in the blank: Ethical hackers use their skills to ______.

A

strengthen security and prevent breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fill in the blank: Unauthorized access to systems is characteristic of ______ hacking.

A

unethical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False: Ethical hacking requires authorization from the system owner.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: Black-hat hackers act within legal and ethical boundaries.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is one of the key lessons from Kevin Mitnick's story?
Even notorious black-hat hackers can turn ethical and contribute positively.
26
What motivates hacktivists?
Promote a political or social agenda.
27
What happened in the 2008 cyber-attacks by Anonymous?
They protested against the Church of Scientology's censorship.
28
What is a gray-hat hacker?
Operates without permission but does not intend harm.
29
What is the impact of unethical behavior in cybersecurity?
Causes financial losses and reputational damage.
30
What is the role of cybersecurity laws?
Protect against unauthorized access, fraud, and data breaches.
31
Who does the ECPA affect?
Internet users, law enforcement, ISPs, and companies storing user data.
32
What does the ECPA prohibit?
Unauthorized interception of emails, phone calls, and online communications.
33
What must law enforcement obtain to access stored digital communications?
A warrant.
34
What can the government demand without a full warrant under the ECPA?
Metadata.
35
What notable case involved Microsoft and the U.S. government?
Microsoft vs. U.S. Government (2013-2018).
36
What did Microsoft argue in the notable case regarding ECPA?
That ECPA did not apply outside the U.S.
37
Why is the ECPA significant?
It protects online privacy but has loopholes allowing government surveillance.
38
What does intellectual property (IP) refer to in cybersecurity?
Creations of the mind that are legally protected from unauthorized use.
39
What types of creations does IP protect in cybersecurity?
Software, databases, cryptographic methods, and other digital assets.
40
What are the types of intellectual property protection?
* Copyright * Patents * Trademarks * Trade Secrets
41
What does copyright protect?
Original works, including software code, digital content, music, books, and films.
42
How long does copyright protection last?
For the creator’s lifetime + 50 to 100 years.
43
What must be filed and approved for patent protection?
An application by a government patent office.
44
How long does patent protection last?
20 years.
45
What does trademark protection cover?
Distinctive brand elements like logos, names, and slogans.
46
What is required for trademark protection?
Registration with trademark offices.
47
How long can trademarks last?
Indefinitely, as long as they are renewed.
48
What is a trade secret?
Privately held, valuable business information.
49
What is required for trade secret protection?
No registration required; protection depends on keeping it secret.
50
What are common types of software licenses?
* Proprietary License * Open-Source License * Freeware * Shareware
51
What is software piracy?
Unauthorized copying, distribution, or use of software without a legal license.
52
What is a key requirement of ISO/IEC 27001?
Risk Assessment.
53
What is the purpose of the NIST Cybersecurity Framework?
Helps organizations identify, protect, detect, respond to, and recover from cyber threats.
54
What are the five core functions of the NIST Cybersecurity Framework?
* Identify * Protect * Detect * Respond * Recover
55
What is the role of an information security professional?
Protect organizations from cyber threats through risk assessment and policy implementation.
56
What are potential consequences of negligence in cybersecurity?
* Data Breaches * Financial Penalties * Loss of Trust * Legal Action
57
What does CISSP stand for?
Certified Information Systems Security Professional.
58
What is the focus of the CISM certification?
Information security governance and compliance.
59
What does CEH stand for?
Certified Ethical Hacker.
60
What is the Security+ certification?
Entry-level certification for IT security fundamentals.