click below
click below
Normal Size Small Size show me how
Lesson3-Chapter3
Principles of Information security
| Question | Answer |
|---|---|
| Ignorance of the...is no excuse | law |
| ...information is created by combining pieces of data that are not considered private in themselves, but may raise privacy concerns when taken together | Aggregate |
| Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is... | education |
| ...is the American contribution to an international effort to reduce the impact of copyright trade mark, and privacy of infringement, especially when accomplish via the removal of technological copyright protection measures | Digital Millennium Copyright Act |
| ...seeks to improve the reliability and accuracy of financial reporting,as well as increase the accountability of corporate governance, in publicly traded companies. | the Sarbanes-Oxley Act |
| ...contains a number of provisions focusing on facilitating affiliation among banks, securities firms, and insurance companies. | The Financial Services Modernization Act of 1999 |
| ...are rules that mandate or prohibit certain behavior in society. | Laws |
| The low overall degree of tolerance for ... may be a function of the easy association between the common crimes of breaking and entering, trespassing, theft, and destruction of property to their computer-related counterparts. | illicit system use |
| Family law, commercial law, and labor law are all encompassed by ... law | private |
| ...allows any person to request access to federal agency records or information not determined to be a matter of national security | The Freedom of Information Act |
| ...is a collection of statues that regulate the interception of wire, electronic, and oral communications. | The Electronic Communications Privacy Act of 1986 |
| Software license infringement is also of ten called... | Software piracy |
| ...Attempts to prevent trade secrets from being illegally shared. | The Economic Espionage Act of 1996 |
| A body of expectations that describe acceptable and unacceptable employee behaviors in the workplace is known as... | policies |
| ...manages a body of knowledge on information security and administers and evaluates examinations for information security certifications. | The International Information system security certification consortium, Inc. (ISC) |
| ...is the legal obligation of an entity that extends beyond criminal or contract law. | Liability |
| To some degree the United nations ... makes provisions for information security during information warfare. | Charter |
| "Long arm..." refers to the long are of the law reaching cross the country or around the world to pull an accused individual into its court systems. | jurisdiction |
| ...is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society | The Association of computing machinery. |
| ...modified a wide range of existing laws to provide law enforcement agencies with broader latitude in order to combat terrorism-related activities. | The USA Patriot Act of 2001. |