Shared Flashcard Set

Details

CISSP Legal
Law, Investigation and Ethics
79
Computer Science
Professional
06/23/2011

Additional Computer Science Flashcards

 


 

Cards

Term
1sr Computer Ethics Institute Commandment
Definition
Not use a computer to harm other people.
Term
Internet Architecture Board (IAB)
Definition
Coordinating committee for Internet design, engineering, and management. Has two principal subsidiary task forces: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRFT).
Term
IAB unethical and unacceptable behavior
Definition
• Purposely seeking to gain unauthorized access to Internet resources
• Disrupting the intended use of the Internet
• Wasting resources (people, capacity, and computers) through purposeful actions
• Destroying the integrity of computer-based information
• Compromising the privacy of others
• Conducting Internet-wide experiments in a negligent manner
Term
Hacker
Definition
Accesses a computer system by circumventing its security system
Term
Salami attack
Definition
Attacker commits several small crimes with the hope that the overall larger crime will go unnoticed.
Term
Cracker
Definition
Breaks into a computer system, often on a network for profit, maliciously entent, or for some altruistic purpose or cause.
Term
Script Kiddies
Definition
Hackers who do not necessarily have the skill to carry out specific attacks without the tools that are provided for them on the Internet and through friends.
Term
Excessive Privileges
Definition
Occurs when a user has more computer rights, permissions, and privileges than what is required for the tasks she needs to fulfil.
Term
Password sniffing
Definition
Sniffing network traffic with the hope of capturing passwords being sent between computers.
Term
IP spoofing
Definition
Creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.
Term
Dumpster diving
Definition
Rummaging through a company’s or individual’s garbage for discarded documents, information, and other precious items that could then be used in an attack against that person or company.
Term
Passive attack
Definition
Non-intrusive, as in eavesdropping or wiretapping
Term
Active attack
Definition
Intrusive, as in DoS (Denial of Service) or penetration attacks
Term
Social engineering
Definition
Art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.
Term
Cuckoo’s Egg
Definition
Book describing how Clifford Stolltracked tracked an intruder that had been breaking into U.S. military systems
Term
Consider a martyr to Hackers
Definition
Kevin Mitnick
Term
Chaos Computer Club
Definition
A group of German hackers committed to freedom of information across borders. Cloned information from European ATM cards and defraud financial institutions and used a web-based Trojan horse to siphon money from bank accounts.
Term
Cult of the Dead Cow
Definition
Group of hackers that has come up with many different hacking tools.
Term
ILOVEYOU
Definition
Virus cost companies billions of dollars, and the responsible person did not get fined a dollar or spend any time in jail because there was no specific law in the Philippines indicating that these actions were illegal.
Term
Due care
Definition
A company did all that it could have reasonably done, under the circumstances, to prevent security breaches, and also took reasonable steps to ensure that if a security breach did take place, proper controls or countermeasures were in place to mitigate the damages.
Term
Due diligence
Definition
Company properly investigated all of its possible weaknesses and vulnerabilities.
Term
Prudent person rule
Definition
Requires management members to perform duties that prudent and responsible people would exercise in similar circumstances.
Term
Civil law
Definition
Deals with wrongs against individuals or companies that result in damages or loss.
Term
Civil law
Definition
Deals with wrongs against individuals or companies that result in damages or loss.
Term
Criminal law
Definition
Used when an individual’s conduct violates the government laws, which have been developed to protect the public.
Term
Administrative/regulatory law
Definition
Deals with regulatory standards that regulate performance and conduct.
Term
Common Law
Definition
Made up of criminal, civil (tort), and administrative laws
Term
Customary Law
Definition
Addresses mainly personal conduct, and uses regional traditions and customs as the foundations of the laws
Term
Trade secret
Definition
Something that is proprietary to a company and important for its survival and profitability.
Term
Copyright law
Definition
Used to protect an author’s writings, an artist’s drawings, a programmer’s source code, or specific rhythms and structures of a musician’s creation.
Term
Trademark
Definition
Protects a word, name, symbol, sound, shape, color, or combination of these
Term
Patents
Definition
A grant of legal ownership of, that excludes others from using or copying, the invention.
Term
Software piracy
Definition
When the intellectual or creative work of an author is used or duplicated without permission or compensation to the author.
Term
Software Protection Association (SPA)
Definition
Formed by major companies to enforce proprietary rights of software.
Term
Federation Against Software Theft (FAST)
Definition
HQ in London, international groups that have formed into a group to protect against software piracy.
Term
Business Software Alliance (BSA)
Definition
HQ in Washington, D.C., international groups that have formed into a group to protect against software piracy.
Term
Digital Millennium Copyright Act (DMCA)
Definition
Makes it illegal to create products that circumvent copyright protection mechanisms.
Term
Chain of custody of evidence
Definition
Dictates that all evidence be labeled with information indicating who secured and validated it.
Term
Chain of custody
Definition
A history that shows how evidence was collected, analyzed, transported, and preserved in order to be presented as evidence in court.
Term
Hearsay
Definition
Evidence is secondhand evidence.
Term
life cycle of evidence
Definition
• Collection and identification
• Storage, preservation, and transportation
• Presentation in court
• Return to the victim or owner
Term
Relevant evidence
Definition
Must have a reasonable and sensible relationship to the findings
Term
Reliable evidence
Definition
Must be consistent with fact
Term
Sufficient evidence
Definition
Must be persuasive enough to convince a reasonable person of the validity of the evidence. This means that the evidence cannot be subject to personal interpretation. Sufficient evidence also means that it cannot be easily doubted.
Term
Hearsay evidence
Definition
Pertains to oral or written evidence presented in court that is secondhand and that has no firsthand proof of accuracy or reliability.
Term
Opinion Evidence
Definition
When a witness testifies, they must testify to only the facts of the issue and not their opinion of the facts.
Term
Corroborative evidence
Definition
Supporting evidence used to help prove an idea or point. It cannot stand on its own, but is used as a supplementary tool to help prove a primary piece of evidence.
Term
Circumstantial evidence
Definition
Prove an intermediate fact that can then be used to deduce or assume the existence of another fact.
Term
Conclusive evidence
Definition
Irrefutable and cannot be contradicted. Is very strong all by itself and does not require corroboration.
Term
Direct evidence
Definition
Can prove a fact all by itself and does not need backup information to refer to.
Term
Secondary evidence
Definition
Not viewed as reliable and strong in proving innocence or guilt (or liability in civil cases). Oral evidence, such as a witness’s testimony, and copies of original documents are examples.
Term
Best evidence
Definition
Primary evidence used in a trial because it provides the most reliability. An example of something that would be categorized as best evidence is an original signed contract.
Term
Exigent circumstances
Definition
Law enforcement may quickly seize evidence to prevent its destruction.
Term
Federal Privacy Act of 1974
Definition
Protect the U.S. citizens’ sensitive information that is collected by government agencies.
Term
Health Insurance Portability and Accountability Act (HIPPA)
Definition
Provide national standards and procedures for the storage, use, and transmission of personal medical information and health care data.
Term
Gramm-Leach-Bliley Act of 1999
Definition
Requires financial institutions to develop privacy notices and give their customers the option to prohibit banks from sharing their information with nonaffiliated third parties.
Term
Computer Fraud and Abuse Act 1986, amended in 1996
Definition
Antihacking statute, prohibits seven forms of activity and makes them federal crimes.
Term
1st European Union Principle on Privacy
Definition
The reason for gathering of data must be specified at the time of collection. This helps reduce the possible misuse of data and forces the individual to justify the reason for gathering the information.
Term
Computer Security Act of 1987
Definition
Requires U.S. federal agencies to identify computer systems that will contain sensitive information.
Term
Security and Freedom Through Encryption Act 1977
Definition
Guarantees the right of all U.S. citizens and residents to be able to use and sell encryption products and technology
Term
Economic Espionage Act of 1996
Definition
Provides the necessary structure when dealing with these types of cases and further defines trade secrets to be technical, business, engineering, scientific, or financial.
Term
Wiretapping
Definition
A passive attack that eavesdrops on communications. It is only legal with prior consent or a warrant.
Term
Logon banners
Definition
Used to inform users of what could happen if they do not follow the rules pertaining to using company resources. This provides legal protection for the company.
Term
3 main types of harm addressed in computer crime laws
Definition
- unauthorized intrusion
- unauthorized alteration
- destruction using malicious code
Term
When looking for suspects, it is important to consider
Definition
Motive, opportunity, and means (MOM)
Term
2nd European Union Principle on Privacy
Definition
Data cannot be used for other purposes. The data can only be used for the original reason it was gathered.
Term
3rd European Union Principle on Privacy
Definition
Unnecessary data should not be collected. Only information that is required to meet the stated purpose should be gathered and no more.
Term
4th European Union Principle on Privacy
Definition
Data should only be kept for as long as it is needed to accomplish the stated task. This helps to ensure that the data is current and prevents indefinite archiving of data.
Term
5th European Union Principle on Privacy
Definition
Only the necessary individuals who are required to accomplish the stated task should be allowed access to the data. This helps prevent the selling of private data to others.
Term
6th European Union Principle on Privacy
Definition
Whoever is responsible for securely storing the data should not allow unintentional “leaking” of data. This helps enforce strong security for those who are responsible for storing private information.
Term
2nd Computer Ethics Institute Commandment
Definition
Not interfere with other people’s computer work.
Term
3rd Computer Ethics Institute Commandment
Definition
Not snoop around in other people’s computer files.
Term
4th Computer Ethics Institute Commandment
Definition
Not use a computer to steal.
Term
5th Computer Ethics Institute Commandment
Definition
Not use a computer to bear false witness.
Term
6th Computer Ethics Institute Commandment
Definition
Not copy or use proprietary software for which you have not paid.
Term
7th Computer Ethics Institute Commandment
Definition
Not use other people’s computer resources without authorization or proper compensation.
Term
8th Computer Ethics Institute Commandment
Definition
Not appropriate other people’s intellectual output.
Term
9th Computer Ethics Institute Commandment
Definition
Think about the social consequences of the program you are writing or the system you are designing.
Term
10th Computer Ethics Institute Commandment
Definition
Always use a computer in ways that ensure consideration and respect for your fellow humans.
Supporting users have an ad free experience!