CIS227_HighYield_Flashcards

(52 cards)

1
Q

What is the CFAA?

A

The Computer Fraud and Abuse Act; a U.S. law enacted in 1986 that criminalizes unauthorized access to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ‘unauthorized access’ mean under CFAA?

A

Accessing a computer system without permission or exceeding authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the DMCA?

A

The Digital Millennium Copyright Act; a U.S. law that criminalizes the circumvention of DRM and protects online service providers from copyright infringement liability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the ECPA?

A

The Electronic Communications Privacy Act; regulates government and third-party access to wire, oral, and electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the PATRIOT Act?

A

Post-9/11 legislation that expanded surveillance capabilities of law enforcement, including roving wiretaps and monitoring internet activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define ‘ethical hacking.’

A

Ethical hacking is authorized testing of systems to find and fix security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a ‘white hat’ hacker?

A

An ethical hacker who uses skills to protect systems and identify vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a ‘black hat’ hacker?

A

A malicious hacker who exploits systems for personal or financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a ‘gray hat’ hacker?

A

A hacker who may violate laws or ethical standards but without malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

A

Manipulating people into giving up confidential information, often via deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give an example of social engineering.

A

Phishing emails tricking users into providing login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a phishing attack?

A

A form of social engineering where attackers impersonate legitimate entities to steal sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spear phishing?

A

Targeted phishing directed at specific individuals or organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyberstalking?

A

Harassing someone via digital means, such as emails, messages, or social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is identity theft?

A

Using someone else’s personal information without consent, typically for fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is intellectual property?

A

Creations of the mind, such as inventions, art, music, and software, protected by copyright, trademark, or patent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is copyright infringement?

A

Using copyrighted material without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a trademark?

A

A recognizable sign or expression identifying products or services of a particular source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is fair use?

A

Limited use of copyrighted materials without permission for purposes such as commentary, criticism, or education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is digital forensics?

A

The practice of collecting, analyzing, and preserving digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is chain of custody?

A

The documented and unbroken transfer of evidence.

22
Q

What is due diligence?

A

Taking reasonable steps to avoid harm to others or prevent a legal violation.

23
Q

What is due care?

A

Actively maintaining security controls and policies to protect assets.

24
Q

Define cybercrime.

A

Any criminal activity involving a computer or network.

25
Define cyberterrorism.
Politically motivated attacks on information systems.
26
What is malware?
Malicious software like viruses, worms, or ransomware.
27
What is ransomware?
A type of malware that encrypts files and demands payment for decryption.
28
What is a logic bomb?
Malicious code triggered by specific conditions or dates.
29
What is a botnet?
A network of infected computers controlled remotely by an attacker.
30
What is an insider threat?
Security risk posed by employees or contractors with legitimate access.
31
What is GDPR?
General Data Protection Regulation; EU law regulating personal data and privacy.
32
What are the penalties under CFAA?
Criminal charges, fines, and prison time depending on severity.
33
What is ethical relativism?
Ethical standards are subjective and vary by culture or context.
34
What is deontological ethics?
Ethics based on rules and duties, regardless of consequences.
35
What is utilitarianism?
Ethical theory focused on outcomes; the best action maximizes overall happiness.
36
What is the difference between law and ethics?
Law is enforceable by government; ethics is moral conduct, not always legally required.
37
What is HIPAA?
Health Insurance Portability and Accountability Act; protects health data privacy.
38
What is FERPA?
Family Educational Rights and Privacy Act; protects student education records.
39
What is the role of ISC2 Code of Ethics?
Guidelines for professional conduct in cybersecurity roles.
40
What is whistleblowing?
Reporting unethical or illegal activities within an organization.
41
What is the Fourth Amendment’s relevance to cyber law?
Protects against unreasonable searches and seizures, including digital data.
42
What is a warrant?
A legal document authorizing law enforcement to search or seize evidence.
43
What is a subpoena?
A legal order to produce documents or testify in court.
44
What is the difference between criminal and civil law?
Criminal law punishes offenses against the state; civil law resolves disputes between individuals.
45
What is a tort?
A civil wrong causing harm, such as defamation or negligence.
46
What is defamation?
A false statement that harms someone's reputation.
47
What is negligence?
Failure to exercise reasonable care, resulting in damage or injury.
48
What is the role of the FTC in cybersecurity?
Enforces consumer protection laws and penalizes companies for poor data practices.
49
What is a clickwrap agreement?
A digital contract where users must click to agree to terms.
50
What is a browsewrap agreement?
Terms are posted on a website, and use of the site implies agreement.
51
What was U.S. v. Morris (1989)?
First conviction under CFAA; Morris released the first internet worm.
52
What was U.S. v. Nosal?
Case about 'exceeding authorized access' under CFAA by using former employees' credentials.