Ethical, Legal, Privacy and Data Security Flashcards

1
Q

What is GDPR?

A

It specifies how businesses and public sector organisations can handle the information of their customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacking

A

Breaking into a computer system without the permission of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Under which UK law would someone be prosecuted for gaining unauthorised access?

A

Computer Misuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does GDPR cover?

A

Organisations outside the EU who offer goods and services to EU citizens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who does GDPR apply to?

A

Controllers and Processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing is a kind of what?

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When can software inventions be protected by patents in the UK?

A

When the software is an integral part of some machine or system that is patentable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does it mean when a developer has to protect their software products?

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What information does GDPR apply to?

A

Personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is not a technique used by identity thieves?

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sniffing

A

An electronic spying or eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spamming

A

Unsolicited emailing, can disrupt or disable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of service attack

A

An attempt to make a machine or network resource unavailable to its intended users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 types of identity theft

A

Phishing, Skimming, Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Fake requests for confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Skimming

A

Details are stolen from magnetic strip or RF tag of a card

17
Q

Shoulder surfing

A

Direct observation of details