Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
PAPA Framework |
Ethical issues classified into four categories: Privacy Issues, Accuracy Issues, Property Issues, Accessibility Issues. |
|
Privacy Issues |
Involve collecting, storing, and disseminating information about individuals. |
|
Accuracy Issues |
Involve the authenticity, fidelity, and correctness of information collected and processed. |
|
Property Issues |
Involve the ownership and value of the information. |
|
Accessibility Issues |
What information does a person or an organization have the right or privilege to obtain, under what conditions and with what safeguards. |
|
Opt-in Model |
Prohibits an organization from collecting any personal information unless the customer authorizes it. |
|
Opt-out Model |
Permits the company to collect personal information until the customer specifically requests that the data not be collected. |
|
Information Security |
Refers to all the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. |
|
Human Errors |
The leading cause of information systems failure. Ex, opening questionable emails, poor password selection and use, careless internet surfing. |
|
Social Engineering |
Perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information such as passwords. |
|
Phishing |
The attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication. |
|
Spear-phishing |
A technique that fraudulently obtains private information by sending highly customized emails to few end users. |
|
Identity Theft |
Someone uses another individuals private information without ones knowledge or consent to commit a crime, such as fraud or theft. |
|
Distributed Denial of Service (DDOS) |
Attack in which an attacker first takes over many computers, which are called slaves, zombies or bots, and uses these slaves to deliver a coordinated stream of information requests to a target computer, causing it to crash. |
|
Supervisory Control and Data Acquisition Attack (SCADA) |
Attack targets SCADA systems, which are large scale, distributed measurement and control systems. |