• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back

What is from the Internet Architecture Board (IAB) Ethics and the Internet (RFC 1087)?

Access to and use of the Internet is a privilege and should be treated as such by all users of the systems.

Which computer crime is MORE often associated with INSIDERS?

Data diddling

Phreakers are hackers who specialize in telephone fraud. What type of telephone fraud/attack makes use of a device that generates tones to simulate inserting coins in pay phones, thus fooling the system into completing free calls?

Red Boxes

What category of law deals with regulatory standards that regulate performance and conduct? Government agencies create these standards, which are usually applied to companies and individuals within those companies?

Administrative law.

The copyright law ("original works of authorship") protects the right of the owner in all except?

The idea itself

Due care is not related to:

Profit

When a possible intrusion into your organization's information system has been detected, what action should be performed first?

Determine to what extent systems and data are compromised.

When should a post-mortem review meeting be held after an intrusion has been properly taken care of?

Within the first week of completing the investigation of the intrusion.

What Cloud Deployment model consist of a cloud infrastructure provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units)? Such deployment model may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.

Private Cloud

What group represents the leading source of computer crime losses?

Employees

Under United States law, an investigator's notebook may be used in court in which scenario?

To refresh the investigators memory while testifying.

The typical computer fraudsters are usually persons with which characteristic?

They hold a position of trust

What is an example of an active attack?

Scanning

This is a common security issue that is extremely hard to control in large environments. It occurs when a user has more computer rights, permissions, and access than what is required for the tasks the user needs to fulfill. What best describes this scenario?

Excessive Privileges

Law enforcement agencies must get a warrant to search and seize an individual's property, as stated in the _____ Amendment.

Fourth.

What would be MOST important to guarantee that the computer evidence will be admissible in court?

The chain of custody of the evidence must show who collected, secured, controlled, handled, transported the evidence, and that it was not tampered with.

What is the BEST way to detect software license violations?

Regularly scanning PCs in use to ensure that unauthorized copies of software have not been loaded on the PC.

An attack that involves an fraudster tricking a user into making inappropriate security decisions is known as _______________.

Social Engineering

The exact requirements for the admissibility of evidence vary across legal systems and between different cases (e.g., criminal versus tort). At a more generic level, evidence should have some probative value, be relevant to the case at hand, and meet the following criteria which are often called the five rules of evidence ___________ (5).

It has to be authentic, accurate, complete, convincing, and Admissible.