Surveillance Flashcards

(42 cards)

1
Q

What does the Information Commissioner Code attempt to balance?

A

Legit desire of employees for privacy and legit desire of employers to run their business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What did data protection act ensure

A

All information about citizens would only be used for the purposes for which they gave it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the Communications Act make illegal?

A

Using other wifi networks without permission

Sending obscene messages

Using tech to cause anxiety / persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the Privacy & Electronic Communications Regulations protect?

A

A citizen’s right to ‘privacy’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is RIPA concerned with?

A

Regulating the powers of public bodies to carry out surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the IPA try to do?

A

Prohibit interception of communications without lawful authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ‘Cyber-enabled crime’

A

Traditional crimes conducted online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ‘Advanced cybercrime’

A

Attacks against hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who are today’s attack sources?

A

Highly complex global networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybercrime is four things. What are they?

A

Fast
Anonymous
Convenient
Transnational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define malware

A

A program that is covertly inserted into another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the intent of malware?

A

Destroy data
Run intrusive or destructive programs
To compromise confidentiality or integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an APT

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What three things does a Virus have?

A

Infection mechanism
Trigger
Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a infection mechanism

A

how virus spreads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four phases of virus life?

A

Dormant phase
Propagation phase
Triggering phase
Execution phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

define dormant

18
Q

define propagation

A

virus spreading

19
Q

define trigger

A

virus activated

20
Q

define payload

A

virus does its thing

21
Q

how is a virus classified?

A

by target or concealment strategy

22
Q

Define worm

A

Program that to infect more machines and acts as launching pad for attacks on other systems

23
Q

4 examples of worm propagation

A

email
IM
file sharing
through a network

24
Q

what is a muliplatform worm?

A

worm can attack various OS (windows/linux)

25
what is multi-exploit worm?
worm penetrates in different ways
26
what is ultrafast worm?
attempt to optimise rate of propagation?
27
what is polymorphic worm?
worm generates new code in flight
28
what is metamorphic worm
worm behaves differently at different stages of propagation
29
what is zero day exploit?
worm exploits unknown vulnerability for surprise
30
What three offences did Computer Misuse Act define?
Unauthorised access to computer material Unauthorised access with intent to commit or facilitate further offences Unauthorised modication of computer material
31
A person is guilty of an offence in the Computer Misuse Act if what:
he causes a computer to perform a function to secure access to any program or data the access is unauthorised they know this to be the case
32
What things were changed in Police and Justice Bill?
Max penalty for unauthorised access = 6 -> 12 months Impairing operation of a computer = max penalty 12 months Now an offence to make, adapt or supply tools to commit offence
33
What does Directive on Security of Network and Information Systems attempt to do?
Improved cybersecurity at national level Increased cross border cooperation
34
List some legislation limits
Legislation gets out of date Government criticised for placing responsibility for security on individuals UK is limited to tackle something international
35
What is the 'general' concern with data and privacy?
There's now so much data. How is it being kept safe? What rights do you have over it? Can you live off the grid? Can you consciously remove yourself from the datasets that are being collected on you?
36
What things can employers look at?
Emails Telephone messages Security cameras Personal data on employees
37
When is surveillance in workplace allowed?
Detecting crime To comply with regulation Staff quality control
38
What is the main law concerned around surveillance in the workplace?
Information Commissioner Code on monitoring at work
39
What does the ICO monitoring at work recommend for employees?
Employees are entitled to some privacy Methods to surveil should not be intrusive Covert monitoring should happen for crime detection
40
What are the five laws related to privacy and computer misuse? (Alphabetical order)
Communications act Data protection act Investigatory Powers Act Privacy and Electronic Communications Regulations Regulation of Investigatory Powers Act
41
What does RIPA provide rules about?
Interception of communications Getting data relating to communications Carrying out snooping
42
What is significant about the Investigatory Powers Act?
It also covers interception of messages prior to transmission as well as after. Significance: a message that hasn't been sent could still be used as evidence against a person.