CISSP (Domain 9 - Legal, Regulations, Compliance, and Investigations) Flashcards

(34 cards)

1
Q

Civil Law (Tort)

A

No law broken, mostly monetary. Results in damage, loss, injury, or death.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Criminal Law

A

Crimes committed against society. Burden of proof is “Beyond a reasonable doubt”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compensatory Damage - Civil Law

A

Paid for the actual damages which was suffered by a victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Punitive Damages - Civil Law

A

Punishment for the offender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Statutory Damages - Civil Law

A

Amount stipulated within the law rather than calculated based on the degree of harm to the plaintiff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Administrative (Regulatory) Law

A
  • Defines standards of performance and regulates conduct for specific industries (Banking, HIPAA)
  • Burden of proof is “More likely than not”
  • Penalties consist of financial or imprisonment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intellectual Property Law

A

Protects products of the mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trade Secrets - IP Protection

A
  • Resource must provide competitive value
  • Must be reasonably protected from unauthorized use or disclosure
  • Proprietary to a company and import for survival
  • Must be genuine and not obvious
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Copyright - IP Protection

A
  • Last lifetime of the author plus 70 years

- Pieces of work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trademark - IP Protection

A
  • Protect word, name, symbol used to identify a product to be distinguished from others
  • My company look at feel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Patent - IP Protection

A
  • Protection for those who have legal ownership of an invention
  • Exclusive control for 20 years
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 International Boarder Issues for Data

A
  • Each country treats computer crimes differently
  • Evidence rules differ between legal systems
  • Governments may not assist each other in international cases
  • Jurisdiction issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trans-boarder Information Flow (4 Things)

A
  • Movement and storage of data by automatic means across national/federal boundaries
  • Many European countries have strong reactions on flow of personal and financial data
  • Know laws before transmitting data through different areas
  • Route data through other routes, if necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISC^2 Code of Ethics (4 Things)

P/A/P/A

A
  • Protect society, the commonwealth, and the infrastructure (nobody hurt)
  • Act honorably, honestly, justly, responsibly, and legally (do the right thing)
  • Provide diligent and competent service to principals
  • Advance and protect the profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Behavior to Encourage - ISC^2 Code of Ethics

A
  • Research
  • Teaching
  • Identifying, mentoring, and sponsoring candidates for the profession
  • Valuing the certificate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Behavior to Discourage - ISC^2 Code of Ethics

A
  • Raising unnecessary alarm, fear, uncertainty, or doubt
  • Giving unwarranted comfort or reassurance
  • Consenting to bad practice
  • Attaching weak systems to the public network
  • Professional association with amateurs/criminals/non-professionals
17
Q

Protect society, the commonwealth, and the infrastructure - ISC^2 Code of Ethics

A
  • Promote and preserve public trust and confidence in information and systems
  • Promote the understanding and acceptance of prudent information security measures
  • Preserve and strengthen the integrity of the public infrastructure
  • Discourage unsafe practice
18
Q

Act honorably, honestly, justly, responsibly, and legally - ISC^2 Code of Ethics

A
  • Tell the truth
  • Observe all contracts and agreements, expired or implied
  • Treat all constituents fairly
  • Give prudent advise
  • Give preference to the laws of the jurisdiction in which you render your service
19
Q

Provide diligent and competent service to principals - ISC^2 Code of Ethics

A
  • Preserve the value of their systems, applications, and information
  • Respect their trust and the privileges that they grant you
  • Avoid conflicts of interest or the appearance thereof
  • Render only those services for which you are fully competent and qualified
20
Q

Advance and protect the profession - ISC^2 Code of Ethics

A
  • Sponsor for professional advancement those best qualified
  • Avoid professional association with those whose practices or reputation might diminish the profession
  • Take care not to injure the reputation of other professionals through malice or indifference
  • Maintain your competence, keep your skills and knowledge current
21
Q

Why Crimes Are Committed (MOM)

A
  • Motivations: Who commits them and why
  • Opportunities: When would someone take advantage of crimes
  • Means: Who has capability to commit these crimes
22
Q

4 Forensic Procedures

MNSH

A
  • Media Analysis
  • Network Analysis
  • Software Analysis
  • Hardware/Embedded Device Analysis
23
Q

5 Things Digital Evidence Must Be

A
  • Authentic
  • Accurate
  • Complete
  • Convincing
  • Admissible
24
Q

4 Steps to a Forensic Hash on a Drive Image

A
  • Get Image
  • Hash Image
  • Create Message Digest
  • Apply Digital Signature

*Hide Image and digital certificate

25
Computer Forensics
Discipline of using proven methods toward the collection, preservation, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence
26
Forensic Investigative Process | IPCEAPD
- Identification - Preservation - Collection - Examination - Analysis - Presentation - Decision
27
Chain of Custody of Evidence (3 Things)
- Who obtained the evidence and security it? - Where and when it was obtained? - Who had control or possession of the evidence?
28
Evidence Life Cycle (5 Things)
- Collection and identification - Analysis - Storage, preservation, transportation - Present in court - Return to victim (owner)
29
4 Most common reason for improper evidence collection
- No established incident response team - No established incident response procedures - Poorly written policy - Broken chain of custody
30
3 Things Chain of Custody Dictates
- Extreme Documentation - All evidence is labeled with information indicated who security and controlled it - Who, what, where, when, and how
31
Hearsay Evidence
- Oral/Written evidence - No firsthand proof of its reliability and accuracy - Computer generated evidence
32
2 Exceptions to Hearsay Rule
- Business Record Exemption to Hearsay Rule + Docs can only be submitted if created in course of regular business hours + Audit trails can only be used if during normal course of business - Accepting Business Records as Evidence + Chain of custody was maintained + Rel event by a Judge
33
Enticement
Legal, tempting a potential criminal, honeypot
34
Entrapment
Not Legal, tricking a person into committing a crime