Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
What is from the Internet Architecture Board (IAB) Ethics and the Internet (RFC 1087)? |
Access to and use of the Internet is a privilege and should be treated as such by all users of the systems. |
|
Which computer crime is MORE often associated with INSIDERS? |
Data diddling |
|
Phreakers are hackers who specialize in telephone fraud. What type of telephone fraud/attack makes use of a device that generates tones to simulate inserting coins in pay phones, thus fooling the system into completing free calls? |
Red Boxes |
|
What category of law deals with regulatory standards that regulate performance and conduct? Government agencies create these standards, which are usually applied to companies and individuals within those companies? |
Administrative law. |
|
The copyright law ("original works of authorship") protects the right of the owner in all except? |
The idea itself |
|
Due care is not related to: |
Profit |
|
When a possible intrusion into your organization's information system has been detected, what action should be performed first? |
Determine to what extent systems and data are compromised. |
|
When should a post-mortem review meeting be held after an intrusion has been properly taken care of? |
Within the first week of completing the investigation of the intrusion. |
|
What Cloud Deployment model consist of a cloud infrastructure provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units)? Such deployment model may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. |
Private Cloud |
|
What group represents the leading source of computer crime losses? |
Employees |
|
Under United States law, an investigator's notebook may be used in court in which scenario? |
To refresh the investigators memory while testifying. |
|
The typical computer fraudsters are usually persons with which characteristic? |
They hold a position of trust |
|
What is an example of an active attack? |
Scanning |
|
This is a common security issue that is extremely hard to control in large environments. It occurs when a user has more computer rights, permissions, and access than what is required for the tasks the user needs to fulfill. What best describes this scenario? |
Excessive Privileges |
|
Law enforcement agencies must get a warrant to search and seize an individual's property, as stated in the _____ Amendment. |
Fourth. |
|
What would be MOST important to guarantee that the computer evidence will be admissible in court? |
The chain of custody of the evidence must show who collected, secured, controlled, handled, transported the evidence, and that it was not tampered with. |
|
What is the BEST way to detect software license violations? |
Regularly scanning PCs in use to ensure that unauthorized copies of software have not been loaded on the PC. |
|
An attack that involves an fraudster tricking a user into making inappropriate security decisions is known as _______________. |
Social Engineering |
|
The exact requirements for the admissibility of evidence vary across legal systems and between different cases (e.g., criminal versus tort). At a more generic level, evidence should have some probative value, be relevant to the case at hand, and meet the following criteria which are often called the five rules of evidence ___________ (5). |
It has to be authentic, accurate, complete, convincing, and Admissible. |