• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

PAPA Framework

Ethical issues classified into four categories: Privacy Issues, Accuracy Issues, Property Issues, Accessibility Issues.

Privacy Issues

Involve collecting, storing, and disseminating information about individuals.

Accuracy Issues

Involve the authenticity, fidelity, and correctness of information collected and processed.

Property Issues

Involve the ownership and value of the information.

Accessibility Issues

What information does a person or an organization have the right or privilege to obtain, under what conditions and with what safeguards.

Opt-in Model

Prohibits an organization from collecting any personal information unless the customer authorizes it.

Opt-out Model

Permits the company to collect personal information until the customer specifically requests that the data not be collected.

Information Security

Refers to all the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Human Errors

The leading cause of information systems failure. Ex, opening questionable emails, poor password selection and use, careless internet surfing.

Social Engineering

Perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information such as passwords.

Phishing

The attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication.

Spear-phishing

A technique that fraudulently obtains private information by sending highly customized emails to few end users.

Identity Theft

Someone uses another individuals private information without ones knowledge or consent to commit a crime, such as fraud or theft.

Distributed Denial of Service (DDOS)

Attack in which an attacker first takes over many computers, which are called slaves, zombies or bots, and uses these slaves to deliver a coordinated stream of information requests to a target computer, causing it to crash.

Supervisory Control and Data Acquisition Attack (SCADA)

Attack targets SCADA systems, which are large scale, distributed measurement and control systems.