Legal And Privacy Issues In Information Security
61 community-sourced questions and answers. Free — no login.
Information
An organizations most important asset
Information Security
The study and practice of protecting information
Cryptography
Practice of hiding information so unauthorized persons can't read it
Confidentiality
Only people with the right permission can access and use information
Integrity
Information systems and their data are correct
Availability
The security goal of making information systems operate reliably.
DoS
Disrupts information systems so they're no longer available to users
User Domain
Any users of an organizations IT system. AKA End users
Workstation Domain
Computing devices used by end users
LAN Domain
Organizations LAN technologies
WAN Domain
Organizations with remote locations connect to this
Remote access Domain
Process and procedures that end users use to access the organizations IT infrastructure and data.
System/Application Domain
Equipment and data an organization uses to support its' IT infrastructure.
Separation of duties
When 2 or more employees split critical task functions
Patch
Software or code that updates a program to address security problems
Exploit
Successful attacks against a vulnerability
Zero-Day Vulnerability
Exploited before a patch is provided
Threat
Anything that can harm an information system
Risk
The likelihood that a threat will exploit a vulnerability and cause harm
Least privilege
Systems run with the lowest amount of permissions needed to complete tasks.
Need to know
Allows access to only needed data
Logic bomb
Lies dormant for a certain period and when conditions are met it carries out its malicious function.
Industry sector
Group of organizations that share a similar industry type.
U.S. Freedom of Information Act
Governs access to public records of the U.S. federal government
Tort
Wrongful act or harm that hurts a person
Defamation
Maliciously saying false things about another person
Web Beacon
Small, invisible electronic file that is placed on a web page or in an e-mail message that monitors behavior
Preemption
The legal concept that means a higher-ranking law will exclude a lower-ranking law on the same subject
Federalism
Describes the relationship between the states and the U.S. federal government.
Civil procedure
Claims between individuals
Criminal procedure
Wrongs against society
Compliance
The action of following applicable laws and rules and regulations
Audit
An evaluation and verification that certain objectives are met
The Bank Secrecy Act/Currency and Foreign Transactions Reporting Act
Congress created this law to fight drug trafficking, money laundering, and other crimes.
The Gramm-Leach-Bliley Act
Defines any financial institution as any institution that conducts financial activities.
The Federal Reserve (The Fed)
Central bank of the U.S., reports directly to Congress.
The Federal Deposit Insurance Corporation
Provides deposit insurance to banks
The Fair Credit Reporting Act
Allows consumers to opt out of some types of information sharing
Pretexting
Attempt to gain access to customer information without proper authority to do so
The Childrens Online Privacy Act
Governs how information from children is to be collected and used
The Childrens Internet Protection Act
Protects minors from obscene or objectionable material on school or library computers
The Family Educational Rights and Privacy Act
Protects the privacy rights of students and their educational records
Health Insurance Portability and Accountability Act (HIPAA)
Fights health insurance fraud, simplifies how health insurance is administered.
Office for Civil Rights
Enforces HIPAA Privacy and Security Rules
The Sarbanes-Oxley Act
Protects shareholders and investors from financial fraud.
ISO/IEC 27002
Lists 14 sections of information security safeguards.
National Institute of Standards and Technology (NIST)
Creates information security guidance for federal agencies.
Federal Information Security Management Act (FISMA)
Protects federal IT systems and the data in those systems
Category 0
Exercise/Network testing. Internal network testing
Category 1
Unauthorized access. Must be reported to their IT systems even if data is not compromised
Category 2
Denial of Service. Must report successful attacks that harm IT systems
Category 3
Malicious Code. Must report successful installation of software.
Category 4
Improper use. Must report violations of their acceptable use policies.
Category 5
Scans, probes, and Attempted Access. Must report any activities that seek to access or identify IT systems.
Category 6
Investigation. Unusual events that require more review due to being odd or potentially harmful.
Must be protected per PCI DSS requirements
An e-commerce Web server
Fair and Accurate Transaction Act
Enacted by Congress in response to growth in identity theft crime
Main goal of information security
CIA
U.S. Supreme Court justices
Are nominated by the president
The U.S. Cabinet consists of
The vice president and the heads of the 15 executive departments
Source of legal authority for the U.S government
The U.S. Constitution
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials