Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
CIO |
oversees all uses of IT and ensures the strategiv alignment of IT with business goals and objectivesC |
|
CTO |
responsible for ensuring the throughput, speed, accuracy and availibility , and reliability of IT |
|
CSO |
responsible for ensuring the security systems |
|
chief privacy officer |
responsible for ensuring the ethical and legal use information |
|
CKO |
responsible for collecting, maintaining, and distributing the organizations knowledge |
|
information security |
a broad term ecompassing the protection of information from accidental or intentional misuse by person inside or outside and organization |
|
information security policies |
indentify the rules required to maintain information secury |
|
information security plan |
details how an organization will implement the information security policies |
|
token |
small electronic devices that change user passwords automatically |
|
smart card |
has technology in it and small amounts of software to perform some limited processing |
|
content filtering |
occurs when organizations use software that filters content to prevent the transmission of unauthorized information |
|
spam |
unsolicited email |
|
encryption |
scrambles information into an alternative form that requires a key or password to decrypt the information |
|
public key encrypption |
uses two keys, a public that everyone one can have and a private for only one recipient |
|
firewall |
hardware and software that guards a private network by analyzing the information leaving and entering the network |
|
virus |
software with malicious intent to cause annoyance or damage |
|
ethical computer use policy |
contains general principles to guide computer user behavior |
|
information privacy policy |
contains general principles regarding information privacy |
|
accepltable use policy |
a policy that a user must agree to follow in order to be provided access to a network or to the internet |
|
nonrepudiation |
contractual stipulation to ensure that ebusiness participants do not deny their online actions |
|
email privacy policy |
details the extent to which email messsages may be read by others |
|
social media policy |
outlines the corporate guidelines or principles governing employee online communications |
|
monitoring |
tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed |