• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

CIO

oversees all uses of IT and ensures the strategiv alignment of IT with business goals and objectivesC

CTO

responsible for ensuring the throughput, speed, accuracy and availibility , and reliability of IT

CSO

responsible for ensuring the security systems

chief privacy officer

responsible for ensuring the ethical and legal use information

CKO

responsible for collecting, maintaining, and distributing the organizations knowledge

information security

a broad term ecompassing the protection of information from accidental or intentional misuse by person inside or outside and organization

information security policies

indentify the rules required to maintain information secury

information security plan

details how an organization will implement the information security policies

token

small electronic devices that change user passwords automatically

smart card

has technology in it and small amounts of software to perform some limited processing

content filtering

occurs when organizations use software that filters content to prevent the transmission of unauthorized information

spam

unsolicited email

encryption

scrambles information into an alternative form that requires a key or password to decrypt the information

public key encrypption

uses two keys, a public that everyone one can have and a private for only one recipient

firewall

hardware and software that guards a private network by analyzing the information leaving and entering the network

virus

software with malicious intent to cause annoyance or damage

ethical computer use policy

contains general principles to guide computer user behavior

information privacy policy

contains general principles regarding information privacy

accepltable use policy

a policy that a user must agree to follow in order to be provided access to a network or to the internet

nonrepudiation

contractual stipulation to ensure that ebusiness participants do not deny their online actions

email privacy policy

details the extent to which email messsages may be read by others

social media policy

outlines the corporate guidelines or principles governing employee online communications

monitoring

tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed