Computer Security & Compliance: Laws, Policies, and Ethics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

What is compliance in the context of information security?

Compliance is adherence to the rules and regulations that govern the information handled and the industry within which an organization operates.

2
New cards

What are the two types of compliance?

Regulatory Compliance and Industry Compliance.

3
New cards

What is Regulatory Compliance?

Adherence to laws specific to the industry, with legally mandated requirements.

4
New cards

What can happen if an organization fails to comply with regulatory requirements?

Non-compliance can result in fines, legal action, or business shutdown.

5
New cards

Give examples of regulatory compliance laws.

FISMA, HIPAA, SOX, CIPA, COPPA (US); Data Privacy Act (Philippines).

6
New cards

What is Industry Compliance?

Adherence to regulations not mandated by law but can severely impact business operations.

7
New cards

What is an example of Industry Compliance?

PCI DSS (Payment Card Industry Data Security Standard).

8
New cards

What types of controls do organizations use to achieve compliance?

Physical Controls, Administrative Controls, and Technical Controls.

9
New cards

What is an information security policy?

A formalized statement that defines how security will be implemented within an organization.

10
New cards

What is the purpose of an information security policy?

To protect the confidentiality, integrity, and availability (CIA) of sensitive data and resources.

11
New cards

What is an Acceptable Use Policy?

A policy that a user must agree to follow to be provided access to a network/Internet.

12
New cards

What does a Backup Policy define?

Backup schedules, retention, and recovery procedures.

13
New cards

What is the purpose of an Incident Response Policy?

To help IT staff detect, respond to, and recover from security incidents.

14
New cards

What is the purpose of a Data Classification Policy?

To categorize a company's stored information based on its sensitivity level.

15
New cards

What are the four data classification levels?

Public, Internal, Confidential, Restricted.

16
New cards

What is the lowest sensitivity level in data classification?

Public.

17
New cards

What is an example of Confidential data?

Employee records, student grades, financial data.

18
New cards

What does PCI DSS stand for?

Payment Card Industry Data Security Standard.

19
New cards

What is the scope of FISMA?

All US federal government agencies, state agencies, and private companies handling federal data.

20
New cards

What is the purpose of HIPAA?

To protect the rights and data of patients in the US healthcare system.

21
New cards

What does SOX regulate?

Financial data, operations, and assets of publicly-held companies.

22
New cards

What is the requirement of CIPA?

To prevent children from accessing obscene or harmful content over the Internet.

23
New cards

What does COPPA regulate?

Organizations collecting data from minors younger than 13.

24
New cards

What is Personally Identifiable Information (PII)?

Information that can identify an individual, such as name, address, SSN, phone number.

25
New cards

What is the highest level of data sensitivity?

Restricted.

26
New cards

What are the consequences of exposing Restricted data?

It could cause serious legal, financial, or reputational damage.

27
New cards

What are examples of Restricted data?

Source code, medical records, encryption keys, intellectual property.

28
New cards

What is the purpose of a Password Policy?

To establish rules for creating, storing, and utilizing secure passwords.

29
New cards

What is a Network Access Policy?

Defines who can access what network resources.

30
New cards

What is the purpose of RA 8792 (E-Commerce Act)?

Legalizes electronic/online transactions, documents, and signatures.

31
New cards

How does the E-Commerce Act promote e-commerce?

By providing a secure and predictable legal environment.

32
New cards

What is considered a criminal offense under the E-Commerce Act?

Hacking or unauthorized access to computer systems.

33
New cards

What does RA 10173 (Data Privacy Act) safeguard?

Individuals' personal data, especially in electronic transactions.

34
New cards

What is a key requirement of the Data Privacy Act?

Obtain lawful and informed consent before collecting personal data.

35
New cards

What must organizations do in case of data breaches according to the Data Privacy Act?

Notify the National Privacy Commission (NPC) and affected individuals.

36
New cards

What is the main requirement of RA 11934 (SIM Registration Act)?

All SIM cards must be registered before activation.

37
New cards

What illegal activities does the SIM Registration Act aim to combat?

Scam texts, cybercrime, and terrorism.

38
New cards

What is the purpose of RA 10175 (Cybercrime Prevention Act)?

Addresses and penalizes crimes committed through computer systems and the Internet.

39
New cards

What are some defined offenses under the Cybercrime Prevention Act?

Hacking, identity theft, cybersex, child pornography, and online libel.

40
New cards

What is the penalty for cyber-libel under the Cybercrime Prevention Act?

1-6 months imprisonment and/or a fine of ₱50,000-₱250,000.

41
New cards

What distinguishes laws from ethics in information security?

Laws tell you what you must NOT do, while ethics guide you on what you SHOULD do.

42
New cards

What is the principle of confidentiality in information security ethics?

Protect data from unauthorized access and respect privacy.

43
New cards

What does the integrity principle in information security entail?

Ensuring data accuracy and authenticity, avoiding tampering.

44
New cards

What is the availability principle in information security ethics?

Keeping systems accessible and functioning, prioritizing safety.

45
New cards

What is an example of a common ethical violation in information security?

Peeking at customer or employee records without authorization.

46
New cards

What is the ethical dilemma regarding access control?

Accessing a friend or relative's data when you have admin access is unethical.

47
New cards

What is gray hat hacking?

Exploiting vulnerabilities without permission, even without malicious intent.

48
New cards

What should professionals do regarding sensitive information after employment ends?

Protect sensitive information even after employment ends.

49
New cards

What is a critical concept to master regarding laws?

Understand the difference between regulatory compliance and industry compliance.

50
New cards

What is the main purpose of the Data Privacy Act?

To protect personal data in digital transactions.

51
New cards

What is the penalty for hacking under the Cybercrime Prevention Act?

6-12 years imprisonment and/or at least ₱200,000 fine.

52
New cards

What does the term 'ethical dilemma' refer to in information security?

Situations where a decision may conflict with ethical standards.

53
New cards

What is the importance of continuous learning in the professional code of ethics?

To maintain professional competence.

54
New cards

What is a common exam question type related to ethics?

Scenario-based ethics questions asking 'What would you do?'.

55
New cards

What should you consider when faced with an ethical scenario?

Do I have proper authorization? Is this action necessary for my job?