part 5, IT and the law Flashcards
(186 cards)
this is an E.Ulaw that came into force in 2014 and allows individuals to have personal data about them removed from search engines if it is untrue or no longer relevant
what is the
right to be forgotten
this allows:
- Unauthorized access to a database
- Viewing restricted content of a database
- Changing or deleting the contents of the database
- reconnoitre a site before performing a serious attack
what 4 actions does an
SQL injection (SQLi)
allow
Section 171(1) of the General Data Protection egulation (GDPR) may allow this if:
- with a view to testing the effectiveness of the de-identification of personal data,
- without intending to cause, or threaten to cause, damage or distress to a person, and
- in the reasonable belief that, in the particular circumstances, re-identifying the information was justified as being in the public interest.
under which 3 circumstances would Section 171(1) of the General Data Protection egulation (GDPR) allow for the
de-anonimisation of anonimised data
talk talk were attacked in july, september and october of 2015
in 2015 which months were talk talk attacked
this section is concerned with
unauthorised access intending to commit or assist the commission of further offences
what is
section 2 of the Computer Misuse Act (CMA) 1990
concerned with
what is a
query string
this is part of a websites Uniform Resource Locator (URL). it does not determine the address of the web page but instead is a method of transmitting data. for example from a web form to a server

from this company attackers stole:
- 157,000 customer accounts were stolen, including information such as names and addresses, dates of birth, email and telephone details, as well as account information
- attackers stole complete bank or credit card records belonging to 16,000 customers
- partial banking details of a further 28,000 customers
in october 2015 what
data was stolen from talk talk
what are the two
overriding provisions
of the
General Data Protection Regulation (GDPR)
these include:
- Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection or appropriate safeguards for the rights and freedoms of data subjects in relation to the processing of personal data; or there are special circumstances meaning the transfer is necessary.
- Personal data shall be processed in accordance with the rights of data subjects i.e. there must be respect for fundamental rights.
(Open University, 2022)
what did the
Data Protection Act 1998
introduce / acknowledge
this piece of legislation explicitly acknowledges the privacy rights of individuals.
access to this was provide through a terminal that cost £650 with that you would also have to pay for a quarterly subscription of £5 and a 5p page per view during peak hours
how could you gain access to the
prestel service
what is
Section 3a of the Computer Misuse Act (CMA) 1990
This is an amendment that has been made and states that it is a criminal act to develop or supply either software or data that may be used in a crime
to be charged under this it must be proven that:
- The prosecuted had a desire to perform the crime
- The prosecuted took action to perform the crime
example
gaining access where you shouldnt have by accident means that you have met criteria 2 but have not met criteria 1, therfore you cannot be charged under this act
similarly if you plan an attack you have met criteria 1 but until action is taken criteria 2 you cannot be charged under this act
which two criteria must be met in order to be sentenced under the
Computer Misuse Act (CMA) 1990
YES
under Section 171(1) of the law states:
“It is an offence for a person knowingly or recklessly to re-identify information that is de-identified personal data without the consent of the controller responsible for de-identifying the personal data”
does the General Data Protection Regulation (GDPR)
prohibit the act of de-anonimizing data that has been anonimised
such as pseudonymisation data
some knowledge an attacker may gain from using these are:
- which querys were successfully executed
- which tables do/do not exist
- what data does/does not exist
what knowledge could an attacker gain from your database by
receiving error messages
during an SQL injection (SQLi) attack
how do
databases allow webpages to be dynamic in nature
and at the same time avoids creating millions of different web pages for each user
a web page can usually be implemented as a template which can
have data entered into it depending on the situation such as who is logging in
what happens when
restrictions are placed on query strings
to prevent an SQL injection (SQLi) attack
when taking this action the script that tuns query strings into queries will ensure that it only accepts:
- queries with a fixed amount of parameters
- Queries with parameters of certain types
Example
If the script only expects two parameters (name and date) and those parameters must be formatted a certain way or be a certain type then any other query strings that it encounters will be discarded and not passed to the database
how can
Principle 6, Integrity and confidentiality (security)
of
article 5, General Data Protection Regulation (GDPR)
Data Protection Principles
be described / summarised
this can be described / summarised as:
The sixth data protection principle is that personal data processed for any purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical or organisational measures (and, in this principle, “appropriate security” includes protection against unauthorised or unlawful processing and against accidental loss, destruction or damage). (Open University, 2022)
what is the
computer misuse act (CMA) 1990
concerned with
this act is concerned with unautharised access or modification to a computer as well as any crimes carried out with a computer and/or threats to life through use of a computer
in the U.K this position is taken by the
Information Commissioner’s Office (ICO)
general data potection regulation (GDPR) ensures that each member state has a supervisory authority (SA) which oversees data protection
what is the name of the
U.Ks supervisory authority (SA)
- their profits halved
- they spent £60 million upgrading their systems
- their shares dropped
- 101,000 customers were lost in the 3 months following the attack
- they were fined £400,000 for being in breach of the data protection act (DPA) 1998
in the aftermath of the october 2015 attack on talk talk what were the implications for the company
what does
subsection 2(5) of the Computer Misuse Act (CMA) 1990
state
this lists punishments under section 2 and states that there is an up to 5 year pison sentence for most serious crimes. It also states that you can be charged with additional offences as well as section 2 such as when you commit theft
this type of conviction is whee a jury will be involved in the case
what is a
conviction of indictment
what is a
conviction of indictment
this type of conviction is whee a jury will be involved in the case
what is
Section 3za of the Computer Misuse Act (CMA) 1990
This is another amendment which has been made to the Computer Misuse Act (CMA) 1990. it covers the most serious of computer crimes where human life has been has been harmed such as:
- Disrupting food,water or energy supplies
- Disrupting communication or transport networks
- Damage or disrupt healthcare
