CHAPTER 19 Flashcards
(30 cards)
The legal and ethical aspects of computer security encompass a broad
range of topics.
T
Computer attacks are considered crimes but do not carry criminal
sanctions
F
Computers as targets is a form of crime that involves an attack on data
integrity, system integrity, data confidentiality, privacy, or availability
T
The relative lack of success in bringing cybercriminals to justice has
led to an increase in their numbers, boldness, and the global scale of their operations
T
No cybercriminal databases exist that can point investigators to
likely suspects.
T
The successful use of law enforcement depends much more on
technical skills than on people skills
F
Software is an example of real property
F
An example of a patent from the computer security realm is the RSA
public-key cryptosystem.
T
A servicemark is the same as a trademark except that it identifies and
distinguishes the source of a service rather than a product
T
Concerns about the extent to which personal privacy has been and
may be compromised have led to a variety of legal and technical
T
The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users
T
The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual’s use of computer resources.
F
Computer technology has involved the creation of new types of
entities for which no agreed ethical rules have previously been formed
T
Anyone can join the Ad Hoc Committee on Responsible Computing
T
The first comprehensive privacy legislation adopted in the United
States was the Privacy Act of 1974.
T
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.
Computers as targets
The success of cybercriminals, and the relative lack of success of law enforcement, influence the behavior of _______.
A. cyber thieves B. cybercrime victims
C. cybercrime acts D. cyber detectives
cybercrime victims
Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are _______.
A. real property B. cyber property
C. personal property D. intellectual property
real property
Personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, and pets are all examples of _________.
A. intellectual property B. real property
C. personal property D. cyber property
personal property
Any intangible asset that consists of human knowledge and ideas is _______.
intellectual property
_____ can be copyrighted.
A. Dramatic works B. Architectural works
C. Software-related works D. All of the above
All of the above
The copyright owner has which exclusive right(s)?
A. reproduction right B. distribution right
C. modification right D. all of the above
all of the above
A _______ for an invention is the grant of a property right to the inventor.
A. patent B. copyright
C. trademark D. claim
patent
A ______ is a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.
A. copyright B. patent
C. trademark D. all of the above
trademark