midterm Flashcards

1
Q

How does online communication challenge traditional legal structures?

A

It bypasses geographical and jurisdictional restraints, making enforcement of laws across borders difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key legal concerns in cybersecurity?

A

Jurisdictional fragmentation, lack of legal harmonization, and difficulties in attributing cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is cybercrime difficult to regulate internationally?

A

Different countries have varying legal definitions and laws related to cybercrime, making global cooperation challenging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who coined the term “cyberspace” and when?

A

William Gibson in 1982.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What makes cyberattacks difficult to attribute?

A

Anonymity, use of proxy servers, and techniques like botnets that disguise the origin of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is jurisdictional fragmentation a challenge in combating cybercrime?

A

Cybercrime is borderless, while legal systems are based on national sovereignty, creating enforcement gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three emerging cyber threats that require legal regulation?

A

Cybercrime, cyberwar, and cyberterrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Tallinn Manual?

A

A document outlining how international law applies to cyber warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does asymmetry in cyberspace contribute to cyber threats?

A

A small group or individual can launch large-scale cyberattacks without requiring extensive resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is the internet inherently vulnerable to cyberattacks?

A

Why is the internet inherently vulnerable to cyberattacks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of jurisdictional challenges in prosecuting cybercrime?

A

The 2001 “Love Bug” virus originated in the Philippines, but lack of local laws prevented prosecution or extradition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do cybercriminals use “slave” computers?

A

To disguise their location and make it harder to trace the attack back to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What factors make cyberspace difficult to regulate?

A

Global reach, anonymity, lack of borders, and decentralized structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which organizations and policies play a role in international cybersecurity regulation?

A

Cybersecurity Strategy of the European Union

EU Cybersecurity Act

ITU (International Telecommunication Union) Cybersecurity Strategy

ENISA (European Union Agency for Cybersecurity) Risk Management Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Budapest Convention on Cybercrime, and why is it important?

A

An international treaty aimed at harmonizing cybercrime laws, enhancing cooperation, and improving cybercrime investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the NIS 2 Directive, and what does it regulate?

A

An updated EU directive on network and information security, strengthening cybersecurity requirements for essential and important entities.

17
Q

What is the purpose of the EU General Data Protection Regulation (GDPR)?

A

To protect individuals’ personal data and privacy within the EU, setting strict rules on data processing and storage.

18
Q

What are the main cybersecurity threats according to ENISA?

A

Ransomware
Phishing attacks
Data breaches
Supply chain attacks
Insider threats

19
Q

What are the substantive aspects of cybercrime law covered in the course?

A

Definition and classification of cybercrimes
Criminal liability for cyber offenses
Legal frameworks governing cybercrime investigations

20
Q

What are the procedural aspects of cybercrime law?

A

Investigative procedures for digital crimes
Legal mechanisms for cross-border cooperation
Handling digital evidence and forensic procedures

21
Q

Why is jurisdictional fragmentation a challenge in cybersecurity law?

A

Because cybercrimes can be committed across borders, national laws often conflict, making enforcement and prosecution difficult.

22
Q

What is the role of ENISA in cybersecurity?

A

ENISA (European Union Agency for Cybersecurity) provides guidance, risk assessment frameworks, and cybersecurity policies for EU member states.

23
Q

What is the IBM X-Force Threat Intelligence Index, and why is it important?

A

A cybersecurity report analyzing global threat trends, vulnerabilities, and risks to help organizations enhance their defenses.

24
Q

What legal frameworks exist for cybersecurity in finance and AI sectors?

A

EU Artificial Intelligence Act
High-Level Expert Group on AI Ethics Guidelines
EBA Guidelines on ICT and Security Risk Management

25
What is cyber risk management, and why is it important?
A process of identifying, analyzing, and mitigating cybersecurity risks to protect critical infrastructure and sensitive data.
26
What are the key aspects of cybersecurity incident management?
Incident classification Threat detection Incident response and reporting Mitigation strategies
27
What are ICT third-party risks, and why must they be managed?
Risks arising from outsourcing IT services or using third-party vendors, which can introduce vulnerabilities into an organization’s network.
28
What is the responsibility of private entities in cyber operations?
Private organizations must ensure cybersecurity compliance, protect user data, and report cyber incidents as required by regulations.