Management of Information Security Chapter 12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

____ law is classified as a public law.

Administrative

Strong procedures for the handling of potential evidentiary material can minimize the probability of an organization's losing a legal challenge. Organizations should develop specific procedures, along with guidance on the use of these procedures. The policy document should specify all but which of the following?

All of these should be specified

Policies must be all but which of the following?.

Approved by legal

____ law embodies a wide variety of laws pertaining to relationships between and among individuals and organizations.

Civil

____ law is classified as a private law.

Commercial

The Council of Europe drafted the European Council ____________________ Convention, which empowers an international task force to oversee a range of Internet security functions and to standardize technology laws across international borders.

Cyber-Crime

By enacting the ____ in 1996, Congress sought to protect intellectual property and competitive advantage.

EEA

If an individual wishes to request information from a federal agency, the agency must provide that information (unless doing so is a breach of law or national security) under which Act?

FOIA

A(n) search warrant is sworn testimony that certain facts are in the possession of the investigating officer that the officer believes warrant the examination of specific items located at a specific place.

False

Digital forensics is based on the field of traditional forensics. Forensics is the coherent application of criminal investigatory techniques to present evidence of crimes in a court or court-like setting.

False

Due care for a wrongful act includes the obligation to make payment or restitution.

False

In 1996, HIPAA was enacted to protect the confidentiality and security of business data.

False

In digital forensics, all investigations follow the same basic methodology, beginning with the acquisition or seizure of evidence without alteration or damage.

False

Public law regulates the relationships among individuals, and among individuals and organizations.

False

The Electronic Communications Privacy Act of 1986 is also known as the Federal Interception Act.

False

The FOIA requires organizations that retain health care information to use information security mechanisms to protect this information.

False

The Freedom of Information Act (FOIA) requires all local agencies to disclose records requested in writing by any person.

False

The Health Insurance Portability & Accountability Act of 1996 has five essential privacy principles focusing on the protection of personal identity information.

False

The National InfoGard Program began as a joint effort between the FBI's Cleveland office and local technology professionals.

False

The National Information Infrastructure Protection Act of 1996 assigned the National Bureau of Standards, in cooperation with the National Security Agency, with the task of developing standards, guidelines, and associated methods and techniques for computer systems.

False

The Normative ethics framework is the study of what makes actions right or wrong; also known as deontological theory.

False

The Secret Service is responsible for the security of communications and information systems at many government agencies associated with national security.

False

The fairness or rights ethical approach was founded on the work of Aristotle and other Greek philosophers who contributed the idea that all persons who are equal should be treated equally.

False

Laws and policies and their associated penalties only deter if three conditions are present. Which of the following is NOT one of these conditions?

Fear of social contempt

Security of health information is a principle of the ____.

HIPAA

In digital forensics, all investigations follow the same basic methodology. Which of the following should be performed FIRST in a digital forensics investigation?

Identify relevant items of evidentiary value (EM)

Any court can impose its authority over an individual or organization if it can establish ____, a court's right to hear a case if the act was committed in its territory or involving its citizenry.

Jurisdiction

___________________ refers to the ability of law to reach across boundaries to bring accused individuals into its court systems.

Long-arm jurisdiction

____________________ law encompasses family law, commercial law, and labor law.

Private

____ law is pursued in civil court and is not prosecuted by the state.

Tort

(ISC)², which offers the CISSP, requires its members to agree to a code of ethics consisting of four mandatory canons.

True

By adding felony violations of the Computer Fraud and Abuse Act to the list of offenses associated with computer hacking, the Patriot Act identifies specific crimes under which investigators may obtain a wiretap order for wire communications.

True

Digital forensics (also known as e-discovery) involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis.

True

The NSA coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information.

True

The Public Company Accounting Reform and Investor Protection Act addresses issues related to the accountability of company executives.

True

The Sarbanes-Oxley Act of 2002 is also known as the Public Company Accounting Reform and Investor Protection Act.

True

The key difference between policy and law is that, in the case of the former, ignorance is an acceptable defense.

True

The ___ ethical approach emphasizes that an ethical action is one that results in the most good, or the least harm.

Utilitarian

A crime against or using digital media, computer technology, or related components (computer as source or object of crime) is referred to as ____.

digital malfeasance

Due diligence requires that an organization make a valid and ongoing effort to protect others.

digital malfeasance

Due ____________________ requires that an organization make sufficient and ongoing efforts to protect others.

diligence

Socially acceptable behaviors that conform to the widely held principles of the members of that society are referred to as ____________________.

ethics

Enacted in 1999, the Gramm-Leach-Bliley Act addresses ____ issues.

financial

Rules that are adopted and enforced by governments to classify expected behavior in modern society are called ____________________.

laws

Evidentiary ____________________, also known as items of potential evidentiary value, is any information that could potentially support the organization's legal- or policy-based case against a suspect.

material

The origins of ____________________ rights can be traced back to a 1772 document titled The Rights of the Colonists and a List of Infringements and Violations of Rights written by Samuel Adams.

privacy

The structure and administration of government agencies and their relationships with citizens, employees, and other governments is regulated by ____________________ law.

public

Financial compensation for committing a wrongful act is referred to as ____________________.

restitution

The Economic Espionage Act addresses the area of ____.

trade secrets


संबंधित स्टडी सेट्स

Chapter 2 The Counselor: Person and Professional

View Set

(mental) Ch 3: Patient's rights and Legal Issues

View Set

"Two Kinds" Close Read Questions

View Set

ch 11 Wounds, Pressure Ulcers (Fund ch 48)

View Set

Alterations in the Musculoskeletal system quiz

View Set