Domain 1 Flashcards

(48 cards)

1
Q

What does DAD Reference?

A

Disclosure, Altercation and Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does AAA Reference?

A

Authentication, Authorization, Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Difference between an Subject and an Object?

A

A subject is an active entity on a data system, users and programs. An object is any passive data within the system. Objects can range from documents on physical paper, to database tables to text files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is needed for Non-Repudiation?

A

Non-repudiation authenticates the identity of a user who performs a transaction, and ensures the integrity of that transaction. You must have both authentication and integrity to have non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Due Care

A

Due care is doing what a reasonable person would do. It is sometimes called the “prudent man” rule. It is Due Care to patch your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Due Diligence?

A

Due diligence is the management of due care. Due diligence follows a process and can be held legally liable if not followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Gross Negligence?

A

Gross negligence is the opposite of due care. It is a legally important concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Criminal Law?

A

Criminal law pertains to those laws where the victim can be seen as society itself. The goals of criminal law are to deter crime burden of proof in criminal cases is considerable. The crime must be proved beyond any reasonable doubt..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Civil Law?

A

Civil law (tort law), which deals with injury (loosely defined), resulting from someone violating their responsibility to provide a duty of care. The goal of Civil Law is civil law is compensating the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Administrative Law

A

Administrative law or regulatory law is law enacted by government agencies. Government-mandated compliance measures are administrative laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of evidence consists of tangible or physical objects.

A

Real Evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of evidence consists of testimony provided by a witness.

A

Direct Evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of evidence serves to establish the circumstances related to particular points or other evidence?

A

Circumstantial Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of evidence serves to strengthen a particular fact or element in a case?

A

Corroborative evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of evidence constitutes as second hand evidence?

A

Hearsay evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Entrapment

A

Entrapment is when law enforcement, or an agent of law enforcement, persuades someone to commit a crime when the person otherwise had no intention to commit a crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Enticement?

A

Enticement could still involve agents of law enforcement making the conditions for commission of a crime favorable, but the difference is that the person is determined to have already broken a law or is intent on doing so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 3 categories based upon the way in which computer systems relate to the wrongdoing?

A

Computer systems as the target - Crimes where the computer systems serve as a primary target.
Computer systems as a tool to perpetrate the crime - Crimes where the computer is a central component enabling the commission of the crime.
Computer systems involved but incidental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Intellectual Property?

A

Intellectual property refers to intangible property that resulted from a creative act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define a Trademark.

A

Trademarks are associated with marketing. A distinguishing name, logo, symbol, or image represents the most commonly trademarked items.

21
Q

Define a Patent.

A

Patents provide a monopoly to the patent holder on the right to use, make, or sell an invention for a period of time in exchange for the patent holder’s making the invention public. Valid for 20years.

22
Q

Define a Copyright.

A

Copyright represents a type of intellectual property that protects the form of expression in artistic, musical, or literary works.

23
Q

Define a trade Secret.

A

Trade secrets are business-proprietary information that is important to an organization’s ability to compete.

24
Q

What is Trademark Dilution?

A

Trademark dilution typically represents an unintentional attack in which the trademarked brand name is used to refer to the larger general class of products of which the brand is a specific instance.

25
What is Cyber-squatting?
Cybersquatting refers to an individual or organization registering or using, in bad faith, a domain name that is associated with another person’s trademark.
26
What is Typo-squatting?
Typosquatting refers to a specific type of cybersquatting in which the cybersquatter registers likely misspellings or mistyping of legitimate domain trademarks.
27
What are the directives of the European Union Privacy act?
Notifying individuals how their personal data is collected and used. Allowing individuals to opt out of sharing their personal data with third parties. Requiring individuals to opt into sharing the most sensitive personal data. Providing reasonable protections for personal data.
28
What is OECD?
Organization for Economic Cooperation and Development provides a forum in which countries can focus on issues that impact the global economy.
29
What is the EU-US Safe Harbor?
The EU-US Safe Harbor was created to permit personal data of EU citizens to be shared with US organisations as long as the US organisations voluntarily consent to data privacy principles that are consistent with the EU Data Protection Directive.
30
What is the US Privacy Act of 1974?
The Privacy Act of 1974 was created to codify protection of US citizens’ data that is being used by the federal government. The Privacy Act defined guidelines regarding how US citizens’ personally identifiable information would be used, collected, and distributed.
31
What is HIPPA?
Health Insurance Portability and Accountability Act. HIPAA applies to covered entities that are typically healthcare providers, health plans, and clearinghouses.
32
Explain the Computer Fraud and Abuse Act – Title 18 Section 1030.
One of the first US laws pertaining to computer crimes. Attacks on protected computers, which include government and financial computers as well as those engaged in foreign or interstate commerce, which resulted in $5,000 in damages during one year, were criminalized.
33
What is ECPA?
Electronic Communications Privacy Act. CPA protected electronic communications from warrantless wiretapping. The PATRIOT Act weakened some of the ECPA restrictions.
34
Explain the PATRIOT Act of 2001.
Passed in response to 9/11. Expanded law enforcement’s electronic monitoring capabilities. Provided broader coverage for wiretaps. Allowed for search and seizure without requiring immediate disclosure. Generally lessened the judicial oversight required of law enforcement as related to electronic monitoring.
35
What is GLBA?
Gramm-Leach-Bliley Act requires financial institutions to protect the confidentiality and integrity of consumer financial information. Forced them to notify consumers of their privacy practices.
36
What is SOX?
Sarbanes-Oxley Act of 2002. SOX created regulatory compliance mandates for publicly traded companies. The primary goal of SOX was to ensure adequate financial disclosure and financial auditor independence. SOX requires financial disclosure, auditor independence, and internal security controls such as a risk assessment. Intentional violation of SOX can result in criminal penalties.
37
What is PCI-DSS?
Payment Card Industry Data Security Standard. By requiring merchants that process credit cards to adhere to the Payment Card Industry Data Security Standard (PCI-DSS), the major credit card companies seek to ensure better protection of cardholder data through mandating security policy, security devices, control techniques, and monitoring of systems and networks comprising cardholder data environments.
38
Describe the US Computer Fraud and Abuse Act.
The goal of the Computer Fraud and Abuse Act was to develop a means of deterring and prosecuting acts that damaged federal interest computers. “Federal interest computer” includes government, critical infrastructure or financial processing systems; the definition also referenced computers engaging in interstate commerce. he Computer Fraud and Abuse Act criminalized actions involving intentional attacks against protected computers that resulted in aggregate damages of $ 5,000 in 1 year.
39
What are the 3 primary contacts in place with 3rd Party Contractors?
SLA. Attestation. Right to Pen Test, Right to Audit.
40
What is Attestation?
Information security attestation involves having a 3rd party organization review the practices of the service provider and make a statement about the security posture of the organization.
41
What is a Policy?
Policies are high-level management directives. Policy is mandatory.
42
What is a Procedure?
A procedure is a step-by-step guide for accomplishing a task. They are low level and specific. Like policies, procedures are mandatory.
43
What is a Standard?
A standard describes the specific use of technology, often applied to hardware and software. Standards are mandatory.
44
What is a Guideline?
Guidelines are recommendations (which are discretionary). A guideline can be a useful piece of advice.
45
What is a Baseline?
Baselines are uniform ways of implementing a standard. Baselines are discretionary
46
What are the 3 types of Polices?
Program policy - Establishes an organization’s information security program. Issue-specific policies - Listed in NIST SP 800-12 include email policy and email privacy policy. System-specific policies - Include a file server policy, or a Web server policy.
47
Name the 6 Access Control Types?
``` Preventive Detective Corrective Recovery Deterrent Compensating ```
48
What are the 3 categories of Access Control?
Administrative Technical Physical