Term
| 1sr Computer Ethics Institute Commandment |
|
Definition
| Not use a computer to harm other people. |
|
|
Term
| Internet Architecture Board (IAB) |
|
Definition
| Coordinating committee for Internet design, engineering, and management. Has two principal subsidiary task forces: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRFT). |
|
|
Term
| IAB unethical and unacceptable behavior |
|
Definition
• Purposely seeking to gain unauthorized access to Internet resources • Disrupting the intended use of the Internet • Wasting resources (people, capacity, and computers) through purposeful actions • Destroying the integrity of computer-based information • Compromising the privacy of others • Conducting Internet-wide experiments in a negligent manner |
|
|
Term
|
Definition
| Accesses a computer system by circumventing its security system |
|
|
Term
|
Definition
| Attacker commits several small crimes with the hope that the overall larger crime will go unnoticed. |
|
|
Term
|
Definition
| Breaks into a computer system, often on a network for profit, maliciously entent, or for some altruistic purpose or cause. |
|
|
Term
|
Definition
| Hackers who do not necessarily have the skill to carry out specific attacks without the tools that are provided for them on the Internet and through friends. |
|
|
Term
|
Definition
| Occurs when a user has more computer rights, permissions, and privileges than what is required for the tasks she needs to fulfil. |
|
|
Term
|
Definition
| Sniffing network traffic with the hope of capturing passwords being sent between computers. |
|
|
Term
|
Definition
| Creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. |
|
|
Term
|
Definition
| Rummaging through a company’s or individual’s garbage for discarded documents, information, and other precious items that could then be used in an attack against that person or company. |
|
|
Term
|
Definition
| Non-intrusive, as in eavesdropping or wiretapping |
|
|
Term
|
Definition
| Intrusive, as in DoS (Denial of Service) or penetration attacks |
|
|
Term
|
Definition
| Art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. |
|
|
Term
|
Definition
| Book describing how Clifford Stolltracked tracked an intruder that had been breaking into U.S. military systems |
|
|
Term
| Consider a martyr to Hackers |
|
Definition
|
|
Term
|
Definition
| A group of German hackers committed to freedom of information across borders. Cloned information from European ATM cards and defraud financial institutions and used a web-based Trojan horse to siphon money from bank accounts. |
|
|
Term
|
Definition
| Group of hackers that has come up with many different hacking tools. |
|
|
Term
|
Definition
| Virus cost companies billions of dollars, and the responsible person did not get fined a dollar or spend any time in jail because there was no specific law in the Philippines indicating that these actions were illegal. |
|
|
Term
|
Definition
| A company did all that it could have reasonably done, under the circumstances, to prevent security breaches, and also took reasonable steps to ensure that if a security breach did take place, proper controls or countermeasures were in place to mitigate the damages. |
|
|
Term
|
Definition
| Company properly investigated all of its possible weaknesses and vulnerabilities. |
|
|
Term
|
Definition
| Requires management members to perform duties that prudent and responsible people would exercise in similar circumstances. |
|
|
Term
|
Definition
| Deals with wrongs against individuals or companies that result in damages or loss. |
|
|
Term
|
Definition
| Deals with wrongs against individuals or companies that result in damages or loss. |
|
|
Term
|
Definition
| Used when an individual’s conduct violates the government laws, which have been developed to protect the public. |
|
|
Term
| Administrative/regulatory law |
|
Definition
| Deals with regulatory standards that regulate performance and conduct. |
|
|
Term
|
Definition
| Made up of criminal, civil (tort), and administrative laws |
|
|
Term
|
Definition
| Addresses mainly personal conduct, and uses regional traditions and customs as the foundations of the laws |
|
|
Term
|
Definition
| Something that is proprietary to a company and important for its survival and profitability. |
|
|
Term
|
Definition
| Used to protect an author’s writings, an artist’s drawings, a programmer’s source code, or specific rhythms and structures of a musician’s creation. |
|
|
Term
|
Definition
| Protects a word, name, symbol, sound, shape, color, or combination of these |
|
|
Term
|
Definition
| A grant of legal ownership of, that excludes others from using or copying, the invention. |
|
|
Term
|
Definition
| When the intellectual or creative work of an author is used or duplicated without permission or compensation to the author. |
|
|
Term
| Software Protection Association (SPA) |
|
Definition
| Formed by major companies to enforce proprietary rights of software. |
|
|
Term
| Federation Against Software Theft (FAST) |
|
Definition
| HQ in London, international groups that have formed into a group to protect against software piracy. |
|
|
Term
| Business Software Alliance (BSA) |
|
Definition
| HQ in Washington, D.C., international groups that have formed into a group to protect against software piracy. |
|
|
Term
| Digital Millennium Copyright Act (DMCA) |
|
Definition
| Makes it illegal to create products that circumvent copyright protection mechanisms. |
|
|
Term
| Chain of custody of evidence |
|
Definition
| Dictates that all evidence be labeled with information indicating who secured and validated it. |
|
|
Term
|
Definition
| A history that shows how evidence was collected, analyzed, transported, and preserved in order to be presented as evidence in court. |
|
|
Term
|
Definition
| Evidence is secondhand evidence. |
|
|
Term
|
Definition
• Collection and identification • Storage, preservation, and transportation • Presentation in court • Return to the victim or owner |
|
|
Term
|
Definition
| Must have a reasonable and sensible relationship to the findings |
|
|
Term
|
Definition
| Must be consistent with fact |
|
|
Term
|
Definition
| Must be persuasive enough to convince a reasonable person of the validity of the evidence. This means that the evidence cannot be subject to personal interpretation. Sufficient evidence also means that it cannot be easily doubted. |
|
|
Term
|
Definition
| Pertains to oral or written evidence presented in court that is secondhand and that has no firsthand proof of accuracy or reliability. |
|
|
Term
|
Definition
| When a witness testifies, they must testify to only the facts of the issue and not their opinion of the facts. |
|
|
Term
|
Definition
| Supporting evidence used to help prove an idea or point. It cannot stand on its own, but is used as a supplementary tool to help prove a primary piece of evidence. |
|
|
Term
|
Definition
| Prove an intermediate fact that can then be used to deduce or assume the existence of another fact. |
|
|
Term
|
Definition
| Irrefutable and cannot be contradicted. Is very strong all by itself and does not require corroboration. |
|
|
Term
|
Definition
| Can prove a fact all by itself and does not need backup information to refer to. |
|
|
Term
|
Definition
| Not viewed as reliable and strong in proving innocence or guilt (or liability in civil cases). Oral evidence, such as a witness’s testimony, and copies of original documents are examples. |
|
|
Term
|
Definition
| Primary evidence used in a trial because it provides the most reliability. An example of something that would be categorized as best evidence is an original signed contract. |
|
|
Term
|
Definition
| Law enforcement may quickly seize evidence to prevent its destruction. |
|
|
Term
| Federal Privacy Act of 1974 |
|
Definition
| Protect the U.S. citizens’ sensitive information that is collected by government agencies. |
|
|
Term
| Health Insurance Portability and Accountability Act (HIPPA) |
|
Definition
| Provide national standards and procedures for the storage, use, and transmission of personal medical information and health care data. |
|
|
Term
| Gramm-Leach-Bliley Act of 1999 |
|
Definition
| Requires financial institutions to develop privacy notices and give their customers the option to prohibit banks from sharing their information with nonaffiliated third parties. |
|
|
Term
| Computer Fraud and Abuse Act 1986, amended in 1996 |
|
Definition
| Antihacking statute, prohibits seven forms of activity and makes them federal crimes. |
|
|
Term
| 1st European Union Principle on Privacy |
|
Definition
| The reason for gathering of data must be specified at the time of collection. This helps reduce the possible misuse of data and forces the individual to justify the reason for gathering the information. |
|
|
Term
| Computer Security Act of 1987 |
|
Definition
| Requires U.S. federal agencies to identify computer systems that will contain sensitive information. |
|
|
Term
| Security and Freedom Through Encryption Act 1977 |
|
Definition
| Guarantees the right of all U.S. citizens and residents to be able to use and sell encryption products and technology |
|
|
Term
| Economic Espionage Act of 1996 |
|
Definition
| Provides the necessary structure when dealing with these types of cases and further defines trade secrets to be technical, business, engineering, scientific, or financial. |
|
|
Term
|
Definition
| A passive attack that eavesdrops on communications. It is only legal with prior consent or a warrant. |
|
|
Term
|
Definition
| Used to inform users of what could happen if they do not follow the rules pertaining to using company resources. This provides legal protection for the company. |
|
|
Term
| 3 main types of harm addressed in computer crime laws |
|
Definition
- unauthorized intrusion - unauthorized alteration - destruction using malicious code |
|
|
Term
| When looking for suspects, it is important to consider |
|
Definition
| Motive, opportunity, and means (MOM) |
|
|
Term
| 2nd European Union Principle on Privacy |
|
Definition
| Data cannot be used for other purposes. The data can only be used for the original reason it was gathered. |
|
|
Term
| 3rd European Union Principle on Privacy |
|
Definition
| Unnecessary data should not be collected. Only information that is required to meet the stated purpose should be gathered and no more. |
|
|
Term
| 4th European Union Principle on Privacy |
|
Definition
| Data should only be kept for as long as it is needed to accomplish the stated task. This helps to ensure that the data is current and prevents indefinite archiving of data. |
|
|
Term
| 5th European Union Principle on Privacy |
|
Definition
| Only the necessary individuals who are required to accomplish the stated task should be allowed access to the data. This helps prevent the selling of private data to others. |
|
|
Term
| 6th European Union Principle on Privacy |
|
Definition
| Whoever is responsible for securely storing the data should not allow unintentional “leaking” of data. This helps enforce strong security for those who are responsible for storing private information. |
|
|
Term
| 2nd Computer Ethics Institute Commandment |
|
Definition
| Not interfere with other people’s computer work. |
|
|
Term
| 3rd Computer Ethics Institute Commandment |
|
Definition
| Not snoop around in other people’s computer files. |
|
|
Term
| 4th Computer Ethics Institute Commandment |
|
Definition
| Not use a computer to steal. |
|
|
Term
| 5th Computer Ethics Institute Commandment |
|
Definition
| Not use a computer to bear false witness. |
|
|
Term
| 6th Computer Ethics Institute Commandment |
|
Definition
| Not copy or use proprietary software for which you have not paid. |
|
|
Term
| 7th Computer Ethics Institute Commandment |
|
Definition
| Not use other people’s computer resources without authorization or proper compensation. |
|
|
Term
| 8th Computer Ethics Institute Commandment |
|
Definition
| Not appropriate other people’s intellectual output. |
|
|
Term
| 9th Computer Ethics Institute Commandment |
|
Definition
| Think about the social consequences of the program you are writing or the system you are designing. |
|
|
Term
| 10th Computer Ethics Institute Commandment |
|
Definition
| Always use a computer in ways that ensure consideration and respect for your fellow humans. |
|
|