Test Tips

 < Day Day Up > 



As a reminder, the Test Tips sections included at the end of each chapter are extremely important and geared toward helping you focus on the important points within each chapter. Please make sure you understand the following tips and apply your knowledge gained from these tips and the rest of the chapter when answering the review questions at the very end of the chapter.

  • Employees of companies and organizations commit more computer-related crimes than any other group.

  • The Gramm-Leach-Bliley law focuses on ensuring that financial institutions have an obligation to protect the privacy of their customers by implementing and supporting technical, administrative, and physical safeguards.

  • A trade secret is proprietary company information whose secrecy is essential to the health and profitability of a company.

  • Computer fun attacks are computer-related attacks or breaches of computer security generally committed by younger people or script kiddies.

  • Terrorists use computers and software to manipulate funds, trade information, and carry out other tasks that inevitably result in destruction and crime.

  • The U.S. Patriot Act focuses on preventing, deterring, and obstructing terrorist attacks.

  • A salami attack attempts to achieve financial gain by stealing small amounts of information or money that usually goes unnoticed.

  • Hackers can be enticed or lured to unprotected systems called honey pots. Once the intruder has accessed the system, Intrusion Detection Systems, logging, and other tools can be used as an attempt to identify the intruder and use any trails left behind as evidence.

  • Entrapment means luring or pursuing someone into committing an illegal act that the individual had no original intention of committing.

  • Espionage is considered the act of spying on someone or something with the intent of gaining secret, personal, or classified information.

  • Hearsay is evidence that is not generally admissible based on the fact that it is gathered from second-hand sources and not directly tied to a first-hand specific witness.

  • The term, enticement, is defined as the practice or act of alluring, tempting, or attracting someone or something into doing something.

  • Fraud is the intentional misrepresentation of the truth in order to gain a business edge, financial profit, or something considered valuable.

  • Ethics are defined as a set of principles or rules that govern one's morals and actions as they apply to one's duty.

  • Civil law has to do with wrongdoing between people or businesses that typically result in loss or damage.

  • Criminal law protects society from individuals or groups that violate laws enacted by the government.

  • Administrative law regulates how government and agencies should conduct their affairs and business dealings.

  • The Internet Architecture Board (IAB) is the governor or advisor of the Internet Society.

  • If the chain of evidence custody is broken, or if the evidence is ever misplaced, it is likely that the evidence will prove useless to an investigation and will most likely not be admissible in a court of law.

  • The best way to fight piracy is to use only licensed software and report uses of counterfeit or illegal software usage to the original manufacturer of the software.

  • Motive refers to how hackers and cyber criminals are motivated to exploit the weakness of systems and the Internet by money, greed, and ego. As with most things in life, if a weakness exists with something, someone will be willing to exploit it.

  • Opportunity refers to how the Internet and weak or unprotected servers and workstations offer many weaknesses that can be exploited by hackers and would-be cyber criminals. In simple terms, the windows of opportunity are open for those who wish to exploit them.

  • Means refers to exploitation tools, such as 'how-to' books and scripts that are publicly available to that wish of obtaining the means to commit Internet- or computer-related crimes.

  • Cyber stalking is defined as the continuous computerized harassment of another person.



 < Day Day Up > 



The Security+ Exam Guide (TestTaker's Guide Series)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net