Term
|
Definition
- basedon unwritten principles
- generally accepted
- determined by Court Decision, Sovereign
- est. precident
|
|
|
Term
|
Definition
- passed by legislative body
- codification process of documentation and grouped by subject
- Criminal or Civil
|
|
|
Term
|
Definition
- Criminal against society;fine or jailtime
- Civil against 1 party by 1 party; fines/court costs/attorney fees
|
|
|
Term
|
Definition
- regulations
- developed by executive in accordance w/legislation will
- violations pursued in admin law court
- iie. OSHA, USDA, FAA
|
|
|
Term
Intellectual Property Law |
|
Definition
protects rights of ownership of ideas, trademarks, patents, etc.
- Patent invention
- Copyright artistic work
- Trademark design/phrase
- Trade Secret disclosure will damage business
- Licensing to use other's work
- Privacy individ. info
|
|
|
Term
|
Definition
- Privacy Act of 1974
- FERPA
- ECPA
- HIPAA
- GLBA
- COPPA
- USA Patriot Act
- SOX Act
|
|
|
Term
|
Definition
|
|
Term
|
Definition
- awareness and adherence to relevant laws/regulations
- evolve w/new laws
- top mgt priority
- legal support is advised for Sec. Professionals
|
|
|
Term
|
Definition
- legal responsibility for any damage caused by 1 party to another party
- avoid by following compliance, prudent person and:
- due diligence prove authencity of claims
|
|
|
Term
Internal Audits vs External Audits |
|
Definition
- Internal
- Audit dept
- review processes, logs, transactions
- Ensure compliance
- External
- 3rd Party
- Verify Compliance
- Provide oversight
|
|
|
Term
|
Definition
|
|
Term
|
Definition
- criminal act involving using computer as source or target
- stealing restricted information via hacking
- fraud
- illegal activity
- malicious code
|
|
|
Term
Computer Crime Incident Response Process (9 steps) |
|
Definition
- Response capability
- Incident Response and handling
- Triage
- Investigateive
- Containment
- Analysis and tracking
- Recovery
- Repair
- Debriefing and feedback
|
|
|
Term
|
Definition
- Discover/recognize
- Protection
- Recording
- Collection
- Identification
- Storage/preservation
- Transportation
- Presentation in court
- Returned to victim/owner
|
|
|
Term
Evidence Collection Techniques (3 points) |
|
Definition
- Special techniques differ from physical crime
- Utilize PROs
- Amateurs may damage evidence
|
|
|
Term
|
Definition
- Best
- Secondary
- Direct
- Conclusive
- Opinion Expert (facts and expertise) vs Non-expert (just facts)
- Corroborative multiple sources
- Circumstantial
- Hearsay
- Demonstrative
|
|
|
Term
|
Definition
- record of evidence history from collection to presentation
- legal control to provide accountability and integrity
- Collect evidence
- Maintain evidence
- Present in court
- Return to owner
|
|
|
Term
|
Definition
- Reliable
- Preserved
- Relevant
- Properly ID'd
- Legally Permissible
|
|
|
Term
|
Definition
- Protocol Analyzers/Sniffers intercept network traffic
- CCTV video
- Wire Taps subject to ECPA, requires subpeona
- Security Personnel
|
|
|
Term
|
Definition
- may be able to collect w/in org's boundary
- law enforcement has restrictions
- consult legal advisors regarding legal limitations if violated, could be excluded from court
- inform employees of privacy policies
|
|
|
Term
|
Definition
- Analyze SW for virus/worms
- Obtain forensic copies of disk drive
- Analyze disk drives for hidden information: slack space, deleted files, unallocated space
- Analyze network traffic to locate criminal activity
- Shutdown system w/o losing evidence
|
|
|