Shared Flashcard Set

Details

Domain 9 - Legal, Regulations, Investigations, and Complianc
CISSP - Domain 9 - Legal, Regulations, Investigations, and Complianc
66
Computer Networking
Professional
01/14/2014

Additional Computer Networking Flashcards

 


 

Cards

Term
computer assisted crime
Definition
where a computer was used as a tool to help carry out a crime.
Term
computer-targeted crime
Definition
incidents where a computer was the victim of an attack crafted to harm it (and its owners) specifically
Term
computer is incidental.
Definition
where a computer is not necessarily the attacker or the attackee, but just happened to be involved when a crime was carried out
Term
zombies
Definition
compromised systems or computers
Term
bots
Definition
the software installed on the compromised computers to control them
Term
botnet
Definition
when an attacker has several compromised systems
Term
advanced persistent threat (APT)
Definition
it is commonly a group of attackers, not just one hacker, who combines knowledge and abilities to carry out whatever exploit that will get them into the environment they are seeking. The APT is very focused and motivated to aggressively and successfully penetrate a network with variously different attack methods and then clandestinely hide its presence while achieving a well-developed, multilevel foothold in the environment.
Term
Council of Europe (CoE) Convention on Cybercrime
Definition
an attempt
to create a standard international response to cybercrime. In fact, it is the first
international treaty seeking to address computer crimes by coordinating national laws
and improving investigative techniques and international cooperation.
Term
Organization for Economic Co-operation and Development (OECD)
Definition
an international organization that helps different governments come together and tackle the economic, social, and governance challenges of a globalized economy.
Term
European Union Principles on Privacy
Definition
set of principles addresses using and transmitting information considered
private in nature
Term
Data Protection Directive.
Definition
European Union Privacy principles and how they are to be followed. All states in Europe must abide by these principles
to be in compliance, and any company wanting to do business with an EU company,
which will include exchanging privacy type of data, must comply with this
directive.
Term
Safe Harbor requirements
Definition
A construct that outlines how U.S.-based companies can comply with the EU privacy
principles
Term
Wassenaar Arrangement
Definition
implements export controls for “Conventional Arms and Dual-Use Goods and Technologies.” It is currently made-up of 40 countries and lays out rules on how items can be exported from country to country:
Term
Civil (Code) Law System
Definition
Civil law system is rule-based law not precedence based.
Term
Common Law System
Definition
Based on previous interpretations of laws:
Term
civil law
Definition
deals with wrongs against individuals or companies
that result in damages or loss
Term
Criminal law
Definition
used when an individual’s conduct violates the government laws,
which have been developed to protect the public.
Term
Administrative/regulatory law
Definition
deals with regulatory standards that regulate performance
and conduct.
Term
trade secret
Definition
something that is proprietary to a company and important for its survival and profitability. An example of a trade secret is the formula used for a soft
drink, such as Coke or Pepsi.
Term
copyright law
Definition
protects the right of an author to control the public
distribution, reproduction, display, and adaptation of his original work. The law covers
many categories of work: pictorial, graphic, musical, dramatic, literary, pantomime,
motion picture, sculptural, sound recording, and architectural.
Term
trademark
Definition
used to protect a word,
name, symbol, sound, shape, color, or combination of these. The reason a company
would trademark one of these, or a combination, is that it represents their company
(brand identity) to a group of people or to the world.
Term
Patents
Definition
given to individuals or companies to grant them legal ownership of, and
enable them to exclude others from using or copying, the invention covered by the patent.
Term
Freeware
Definition
software that is publicly
available free of charge and can be used, copied, studied, modified, and redistributed
without restriction.
Term
Shareware, or trial ware,
Definition
used by vendors to market their software.
Users obtain a free, trial version of the software. Once the user tries out the program,
the user is asked to purchase a copy of it.
Term
Software Protection Association
(SPA)
Definition
formed by major companies to enforce proprietary rights of
software. The association was created to protect the founding companies’ software developments,
but it also helps others ensure that their software is properly licensed
Term
Digital Millennium Copyright
Act (DMCA)
Definition
makes it illegal to create products that circumvent copyright protection
mechanisms.
Term
Personally identifiable information (PII)
Definition
data that can be used to uniquely identify,
contact, or locate a single person or can be used with other sources to uniquely
identify a single individual
Term
Sarbanes-Oxley Act
Definition
applies to any company that is publicly
traded on U.S. markets. Much of the law governs accounting practices and the methods
used by companies to report on their financial status. However, some parts, Section 404
in particular, apply directly to information technology.
SOX provides requirements for how companies must track, manage, and report on
financial information. This includes safeguarding the data and guaranteeing its integrity
and authenticity.
Term
Health Insurance Portability and Accountability Act (HIPAA),
Definition
U.S. federal regulation,
has been mandated to provide national standards and procedures for the storage,
use, and transmission of personal medical information and healthcare data.
Term
Health Information Technology for Economic and Clinical Health (HITECH)
Definition
was signed
into law to promote the adoption and meaningful use of health information technology.
Term
Gramm-Leach-Bliley Act of 1999 (GLBA)
Definition
requires financial institutions to develop
privacy notices and give their customers the option to prohibit financial institutions
from sharing their information with nonaffiliated third parties
Term
Computer Fraud and Abuse Act
Definition
the primary U.S. federal antihacking statute
Term
Personal Information Protection and Electronic Documents Act (PIPEDA)
Definition
a Canadian
law that deals with the protection of personal information. One of its main goals is to
oversee how the private sector collects, uses, and discloses personal information in
regular business activities
Term
Basel II
Definition
determining the actual exposure to risk of each financial institution
and taking risk mitigation into consideration to provide an incentive for member institutions
to focus on and invest in security measures.
Basel II is built on three main components, called
Term
Payment Card
Industry Data Security Standard (PCI DSS).
Definition
applies to any entity that processes, transmits, stores, or accepts credit
card data. Varying levels of compliance and penalties exist and depend on the size of
the customer and the volume of transactions
Term
Federal Information Security Management Act (FISMA)
Definition
a U.S. law
that requires every federal agency to create, document, and implement an agency-wide
security program to provide protection for the information and information systems
that support the operations and assets of the agency, including those provided or managed
by another agency, contractor, or other source. It explicitly emphasizes a “risk based
policy for cost-effective security.”
Term
Economic Espionage Act of 1996
Definition
provides the necessary structure when dealing with corporate espionage
Term
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept
and Obstruct Terrorism Act of 2001 (aka Patriot Act)
Definition
Reduced restrictions on law enforcement agencies’ ability to search telephone,
e-mail communications, medical, financial, and other records
Term
due care
Definition
a company did all it could have reasonably
done, under the circumstances, to prevent security breaches, and also took
reasonable steps to ensure that if a security breach did take place, proper controls or
countermeasures were in place to mitigate the damages. In short, due care means that
a company practiced common sense and prudent management and acted responsibly.
Term
Due diligence
Definition
the company properly investigated all of its possible weaknesses
and vulnerabilities.
Term
Statement on Auditing Standards No. 70: Service
Organizations (SAS 70)
Definition
an audit that is carried out by a third party to assess the internal
controls of a service organization
Term
legally recognized obligation,
Definition
duty, to protect the plaintiff from unreasonable risks and that the defendant’s failure
to protect the plaintiff from an unreasonable risk (breach of duty) was the proximate
cause of the plaintiff’s damages
Term
vendor management governing process
Definition
includes performance
metrics, service level agreements (SLAs), scheduled meetings, a reporting structure,
and someone who is directly responsible.
Term
International
Organization on Computer Evidence (IOCE)
Definition
created to develop international
principles dealing with how digital evidence is to be collected and handled so
various courts will recognize and use the evidence in the same manner
Term
primary image
Definition
a control copy
that is stored in a library
Term
working image
Definition
used for analysis and evidence collection
Term
chain of custody
Definition
very strict and organized procedures
when collecting and tagging evidence in every single case
Term
Best evidence
Definition
the primary evidence used in a trial because it provides the most reliability
Term
Secondary evidence
Definition
not viewed as reliable and strong in proving innocence or guilt (or
liability in civil cases) when compared to best evidence. Oral evidence, such as a witness’s
testimony, and copies of original documents are placed in the secondary evidence
category.
Term
Direct evidence
Definition
can prove a fact all by itself and does not need backup information to refer to. One example of
direct evidence is the testimony of a witness who saw a crime take place.
Term
Conclusive evidence
Definition
irrefutable and cannot be contradicted. Conclusive evidence is
very strong all by itself and does not require corroboration.
Term
Circumstantial evidence
Definition
can prove an intermediate fact that can then be used to deduce
or assume the existence of another fact. This type of fact is used so the judge or jury will
logically assume the existence of a primary fact. For example, if a suspect told a friend
he was going to bring down eBay’s web site, a case could not rest on that piece of evidence
alone because it is circumstantial. However, this evidence can cause the jury to
assume that because the suspect said he was going to do it, and hours later it happened,
maybe he was the one who did the crime.
Term
Corroborative evidence
Definition
supporting evidence used to help prove an idea or point. It
cannot stand on its own but is used as a supplementary tool to help prove a primary
piece of evidence.
Term
opinion rule
Definition
dictates that she must testify to only the facts
of the issue and not her opinion of the facts.
Term
Hearsay evidence
Definition
pertains to oral or written evidence presented in court that is secondhand
and has no firsthand proof of accuracy or reliability
Term
four characteristics of evidence to provide a foundation for a case
Definition
relevant, complete, sufficient, and reliable
Term
Physical surveillance
Definition
pertains to security
cameras, security guards, and closed-circuit TV (CCTV), which may capture evidence.
Physical surveillance can also be used by an undercover agent to learn about the
suspect’s spending activities, family and friends, and personal habits in the hope of
gathering more clues for the case
Term
Computer surveillance
Definition
pertains to auditing events, which passively monitors events
by using network sniffers, keyboard monitors, wiretaps, and line monitoring
Term
Enticement vs. entrapment
Definition
Entrapment does not prove
that the suspect had the intent to commit a crime; it only proves she was successfully
tricked.
Term
salami attack
Definition
the attacker commits several small crimes with the
hope that the overall larger crime will go unnoticed
Term
Data diddling
Definition
refers to the alteration of existing data. Many times, this modification
happens before the data is entered into an application or as soon as it completes processing
and is outputted from an application. For instance, if a loan processor is entering
information for a customer’s loan of $100,000, but instead enters $150,000 and
then moves the extra approved money somewhere else, this would be a case of data
diddling.
Term
Password sniffing
Definition
sniffing network traffic with the
hope of capturing passwords being sent between computers.
Term
IP spoofing.
Definition
change the IP address within a packet to show a different address
Term
Dumpster diving
Definition
the concept of rummaging through a company or individual’s
garbage for discarded documents, information, and other precious items that
could then be used in an attack against that company or person
Term
Cybersquatting
Definition
when someone purchases a domain name with the goal
of hurting a company with a similar domain name or to carry out extortion
Term
Internet Architecture Board (IAB)
Definition
the coordinating committee for Internet design,
engineering, and management.
Supporting users have an ad free experience!