Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
145 Cards in this Set
- Front
- Back
ACPA
|
anti-cybersquatting consumer protection act
|
|
ACM
|
Association for computing machinery
-professional organizations -has code of ethics and professional conduct |
|
Anonymous remailer
|
an internet service that allows an email sender to remain anonymous by stripping the originating address from an email message and then forwarding it to its intended receipt
|
|
black box testing
|
unit testing of software that has expected input and output behaviors, with the inner workings unknown
|
|
white box testing
|
unit testing of software that has expected input and output behaviors and whose internal workings are known. It involves the testing of all possible logica paths through the software unit and is done with thorough knowledge of the software's logic
|
|
burden of proof
|
the requirement that the plaintiff (the party bringing a civil lawsuit) show by a "preponderance of evidence" or "weight of evidence" that all the facts necessary to win a judgment are presented and are probably true
|
|
contingent workforce
|
independent contractors, employees brought in through employment agencies, on call or day laborers, and on site workers whose services are provided by contract firms
|
|
contributory negligence
|
a doctrine of common law that if a person was injured in part due to his/her own negligence (his/her negligence "contributed" to the accident), the injured party would not be entitled to collect any damages (money) from another party who supposedly caused the accident. Under this rule, a badly injured person who was only slightly negligent could not win in court against a very negligent defendant.
|
|
CPO
|
chief privacy officer
|
|
chief privacy officer
|
a senior manager responsible for training employees about privacy, checking the company's privacy policies for potential risks and then figuring out how ot fill gaps, and managing customer privacy disputes
|
|
cracker
|
a hacker who performs illegal acts such as breaking into other people's networks and systems, defacing Web pages, crashing computers, spreading harmful programs or hateful messages, or writing scripts and automatic programs that let other people do the same things
|
|
cybersquatter
|
someone who registers a web site domain that contains a famous trademark or company name to which the person has no connection, with the hope that the trademark's legitimate owners will pay to gain ownership of the domain
|
|
defamation
|
the publication of a statement of alleged fact that is false and that harms another person
|
|
denial of service attack
|
an attack in which a malicious hacker takes over computers on the internet and causes them to flood a target site with demands for data and other small tasks
|
|
digital divide
|
a term used to describe the gulf between people who do and don't have access to modern information and communications technology
|
|
Electronic Communications Privacy Act of 1986 shorthand
|
ECPA
|
|
Electronic Communications Privacy Act of 1986 is
|
a law that set standards for access to stored e-mail and other electronic communications and records
|
|
fair use doctrine
|
a set of criteria that courts employ to determine the fair use of copyrighted property and whether it can be allowed without penalty
|
|
felony
|
1) a crime sufficiently serious to be punishable by death or a term in state or federal prison, as distinguished from a misdemeanor which is only punishable by confinement to county or local jail and/or a fine. 2) a crime carrying a minimum term of one year or more in state prison, since a year or less can be served in county jail. However, a sentence upon conviction for a felony may sometimes be less than one year at the discretion of the judge and within limits set by statute. Felonies are sometimes referred to as "high crimes" as described in the U.S. Constitution.
|
|
honeypot
|
a decoy computer server that gives hackers fake information about a network in order to confuse them and log their activities
|
|
injunctive relief
|
a court-ordered act or prohibition against an act or condition which has been requested, and sometimes granted, in a petition to the court for an injunction. Such an act is the use of judicial (court) authority to handle a problem and is not a judgment for money. Whether the relief will be granted is usually argued by both sides in a hearing rather than in a full-scale trial, although sometimes it is part of a lawsuit for damages and/or contract performance. Historically, the power to grant injunctive relief stems from English equity courts rather than damages from law courts.
|
|
intellectual property
|
distinct works such as art, books, films, formulae, inventions, music, and processes that are "owned" or created by a single entity
|
|
ISO 9000
|
a series of standard that require organizations to develop formal quality management systems that focus on identifying and meeting customer needs and expectations
|
|
John Doe lawsuit
|
a lawsuit in which the true identity of the defendant is temporarily unknown
|
|
libel
|
a written statement of alleged fact that is false and that harms another person
|
|
logic bomb
|
a type of trojan horse that executes under specific conditions
|
|
malpractice
|
An act or continuing conduct of a professional which does not meet the standard of professional competence and results in provable damages to his/her client or patient. Such an error or omission may be through negligence, ignorance (when the professional should have known), or intentional wrongdoing. However, malpractice does not include the exercise of professional judgment even when the results are detrimental to the client or patient. Except in cases of extremely obvious or intentional wrongs, in order to prove malpractice there must be testimony of an expert as to the acceptable standard of care applied to the specific act or conduct which is claimed to be malpractice and testimony of the expert that the professional did not meet that standard. The defendant then can produce his/her own expert to counter that testimony. Professions which are subject to lawsuits based on claims of malpractice include lawyers, physicians, dentists, hospitals, accountants, architects, engineers and real estate brokers. In some states in order to file an action for malpractice against a medical caregiver, there must be a written demand or notice which gives the physician or hospital a chance to settle the matter before a suit is filed. In actions against attorneys it is mandatory that the plaintiff prove that the error, if any, caused damages. This means that a lawsuit, claim or negotiation the attorney was handling would have resulted in a win or better recovery except for the malpractice.
|
|
misdemeanor
|
a lesser crime punishable by a fine and/or county jail time for up to one year. Misdemeanors are distinguished from felonies, which can be punished by a state prison term. They are tried in the lowest local court such as municipal, police or justice courts. Typical misdemeanors include: petty theft, disturbing the peace, simple assault and battery, drunk driving without injury to others, drunkenness in public, various traffic violations, public nuisances and some crimes which can be charged either as a felony or misdemeanor depending on the circumstances and the discretion of the District Attorney. "High crimes and misdemeanors" referred to in the U.S. Constitution are felonies.
|
|
national security letter
|
a government notification that requires financial institutions to turn over electronic records about the finances, telephone calls, e-mail, and other personal information of suspected terrorists or spies
|
|
negligence
|
failure to do what a reasonable person would do, or doing something that a reasonable person would not
|
|
nondisclosure clause
|
a clause in an employment contract that prohibits employees from revealing company trade secrets
|
|
noncompete agreement
|
an agreement that requires employees not to work for a competitor for a period of time after leaving an employer
|
|
open source code
|
a program whose source code is available for use or modification by other developers
|
|
opt in
|
an approach to data collection that requires permission from consumers before their data is collected
|
|
opt out
|
an information gathering method requires consumers to inform companies not to collect data about them; otherwise, companies assume they can collect the consumers personal information
|
|
patent farming
|
an unethical strategy of influencing a standards organization to make use of a patented item without revealing the existence of the patent; later, the patent holder might demand royalties from all implementers of the standard
|
|
phishing
|
an attempt to steal private data by tricking users into entering the information on a counterfeit web site
|
|
prior art
|
the body of knowledge available to a person of ordinary skill in an art. A patent cannot be issued for an invention whose professed improvements already exist in the prior art
|
|
public key encryption
|
a system that uses a public key to encode messages and a private key to decode messages
|
|
private key encryption
|
a system that uses only one key to both encode and decode messages
|
|
quid pro quo
|
Latin for "something for something," to identify what each party to an agreement expects from the other, sometimes called mutual consideration. Example of its use: "What is the quid pro quo for my entering into this deal?"
|
|
recklessness
|
In the criminal law, recklessness (also called unchariness) is one of the four possible classes of mental state constituting mens rea (the Latin for "guilty mind"). To commit an offence of ordinary as opposed to strict liability, the prosecution must be able to prove both a mens rea and an actus reus, i.e., a person cannot be guilty for thoughts alone. There must also be an appropriate intention, knowledge, recklessness, or criminal negligence at the relevant time (see concurrence). Recklessness may constitute an offense against property or involve significant danger to another person.
|
|
respondeat superior
|
Latin for "let the master answer," a key doctrine in the law of agency, which provides that a principal (employer) is responsible for the actions of his/her/its agent (employee) in the "course of employment." Thus, an agent who signs an agreement to purchase goods for his employer in the name of the employer can create a binding contract between the seller and the employer. Another example: if a delivery truck driver negligently hits a child in the street, the company for which the driver works will be liable for the injuries.
|
|
reverse engineering
|
the process of analyzing finished software to create a new representation of it in a different form or at a higher level of abstraction
|
|
safety critical system
|
a system whose failure may cause injury or death to human beings
|
|
sarbanes oxley act section 404
|
legislation that requires corporate annual reports to contain signed assurances by CEOs and CFOs that the information in an SEC filing is accurate. Section 404 also requires companies to submit to an audit to prove that it has controls in place to ensure accurate information
|
|
slander
|
an oral statement of alleged fact that is false and that harms another person
|
|
strict liability
|
a version of product liability in which a defendant is held responsible for injuring another person, regardless of negligence or intent
|
|
trade secret
|
information that a company tries to keep confidential, that represents something of economic value, that required effort or cost to develop, and that has some degree of uniqueness or novelty
|
|
trademark
|
a logo, package design, phrase, sound, or word that helps a consumer distinguish one company's products from another's
|
|
trojan horse
|
a secretly installed computer program that plants a harmful payload and allows a hacker to steal passwords or spy on users by recording keystrokes and transmitting them to a third party
|
|
USA patriot act of 2001
|
a law passed after the terrorist attacks of Sept 11th that gave sweeping new surveillance powers to domestic law enforcement and international intelligence agencies
|
|
whistle blowing
|
an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest
|
|
worms
|
harmful computer programs that differ from viruses because they can self-propagate without human intervention
|
|
zombies
|
computers that are taken over by a hacker during a denial-of-service attack and directed to send repeated requests for access to a single target site
|
|
TF If you are injured by a product due to the manufacturer's negligence, you can sue the store where you bought the product, even decades after the accident
|
False
|
|
TF Project deliverables may include flowcharts, documentation, and software
|
True
|
|
TF Computer matching of fingerprints is one example of virtually foolproof system
|
False
|
|
TF To be strictly liable means to be responsible for an injury cause by a product, even though the product was manufactured carefully
|
True
|
|
TF Under the theory of negligence, a software supplier is responsible for every product defect, regardless of how careful the supplier was
|
False
|
|
TF Nationwide licensing of computer programmers is imminent, according to the text
|
False
|
|
TF In white box system testing, the tester understands how the system works and puts in test values based on the tester's knowledge of the system
|
True
|
|
TF A safety critical system is one whose malfunction may cause injury or death to human beings
|
True
|
|
TF Fines for criminal violations can be lowered by up to 80 percent if an organization has implemented an ethics management program
|
True
|
|
TF A poor human system interface can greatly increase the risk of a safety critical system causing injury or death
|
True
|
|
TF The sarbanes oxley act does not require that annual reports contain a signed statement by the CFO attesting the accuracy of financial information
|
False
|
|
TF SOX has had little or no effect oupon company costs
|
False
|
|
TF a whistle blower reveals wrong-doing by a company to outsiders
|
True
|
|
An independent contractor, hired by a company to work only on a specific project, would be considered a contingent worker
|
True
|
|
about 10% of the employees in the US are currently working under H1-B visas
|
False
|
|
The first class action for sexual harassment was brought in the 1980s against eveleth mines
|
true
|
|
under traditional state common law, in the absence of an employment contract, an employee can be terminated for any reason or no reason
|
True
|
|
Overall, technological advances have not made people happier
|
True
|
|
Even if contractors sign an agreement saying they are contingent workers and not employees, this agreement will not be the deciding factor in determining their status
|
False
|
|
Software programmers from India, employed by US companies, are generally paid the same amount as the company's regular employees
|
False
|
|
Vizcaino v. Microsoft illustrated the cost of misclassifying employees
|
True
|
|
the majority of IT jobs in the US have been moved offshore
|
False
|
|
There are more than enough properly trained IT workers in the US to fill the positions available
|
False
|
|
Health care and teaching are the next areas targeted for outsourcing
|
False
|
|
Timothy McVeigh was discharged under the policy colloquially known as
|
don't ask, don't tell, don't pursue
|
|
harvard university's divinity school fired its dean for viewing pornography on a computer belonging to the university
|
false
|
|
employees are almost never fired or disciplined for viewing online pornography at work
|
false
|
|
ramapo college routinely monitors employee mail
|
false
|
|
the percentage of commercial websites which collect no information from users is about 25%
|
False
|
|
most people think ti is acceptable to use their employer's computer system to send personal email
|
True
|
|
There is currently no federal legislation which protects an individuals electronic health information
|
False
|
|
most european countries have taken greater steps to protect privacy than the US government
|
true
|
|
the right to privacy is guaranteed by the bill of rights
|
false
|
|
almost no steps can be taken to control cookies
|
false
|
|
a local NJ hospital injects patients with a computer chip containing the patient's health information
|
true
|
|
fear of new technology is a relatively new phenomenon
|
false
|
|
the government is authorizing fewer wiretaps today than it did in previous years
|
false
|
|
telecommunications companies must build phones so that the government can eavesdrop on conversations
|
true
|
|
the ECPA criminalizes intercepting someone else's email
|
true
|
|
US companies increasingly rely on commercial software with known vulnerabilities to hackers
|
True
|
|
on may 1 2004 CCIS discovers that all emails has been deleted from its email server. A message appears "Happy May Day, Suckers!" The type of program which deleted the email would be best described as
|
logic bomb
|
|
using a false return address for information sent over the internet is known as
|
spoofing
|
|
breaking into a system just to look around but not cause damage would probably be legal
|
false
|
|
identity fraud is the fastest growing form of fraud in the US
|
True
|
|
most network intruders who break into computer systems are outsiders
|
false
|
|
it is a federal crime to use a trade secret belonging to someone else for your own benefit
|
true
|
|
the concept of reasonable assurance recognizes that managers must use their judgment to ensure that the cost of controlling computer crime does not exceed the benefit to be obtained
|
true
|
|
a server set up with meaningless data but designed to lure a hacker is known as a
|
honey pot
|
|
the worldwide cost impact of computer crime has been about 50 million dollars
|
false
|
|
a denial of service attack involves a break in at a target computer
|
false
|
|
computer criminals have very different motives from other types of criminals
|
false
|
|
Anti-cybersquatting consumer protection act
|
allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of US courts
|
|
CERT/CC stands for
|
Computer Emergency Response Team Coordination Center
|
|
CERT/CC does:
|
R&D at carnegie mellon university in pittsburg- help during computer security emergencies and help prevent future incidents - study internet security vulnerabilities, publish security alerts, public awareness campaign
|
|
CIPA stands for
|
Childrens Internet Protection Act
|
|
CIPA does
|
protect children from accessing pornography and other explicit materials online - federally financed schools and libraries use filters to block computer access to obscene materials, if failed to comply than no federal funding given
|
|
COPPA stands for
|
childrens online privacy protection act
|
|
COPPA means:
|
19980 anyone who knowingly and with knowledge of the character of the material, in interstate or foreign commerce by means of the world wide web, makes any communication for commercial purposes that is available to any minor and that includes any material that is harmful to minor shall be fined not more than 50,000, imprisoned not more than 6 months or both - determine unconstitutional in 2004
|
|
check clearing for the 21st century
|
requires that banks accept paper documents with check images and data related to transactions in lieu of original paper checks - this eliminates cost of physical transport as well as speeding the clearing of checks- customers can view and print checks online
|
|
communications decency act
|
CDA, protect children from online porn 1996 - language was too broad , ruled unconstitutional in 1997after Reno v. ACLU
|
|
diamond v. diehr
|
diehr denied patent for his process control computer and senors to monitor the temperature inside a rubber mold, he was denied because a software patent has all of it's invention on a computer, this case changed the scope of protection for software related inventions
|
|
digital millennium copyright act
|
1998- in compliance with global copyright acts made it an offense to:
-circumvent technical protection -develop and provide tools to allow other to access a technologically protected work -manufacture, import, provide, or traffic in tools that enable others to circumvent protection and copy a protected work |
|
economic espionage act
|
protects trade secrets- makes it a federal crime for people to use a trade secret for their own benefit or another's benefit
-usually stolen by insiders, employees |
|
EFF stands for
|
electronic frontier foundation
|
|
EFF does
|
educate press, policy makers, and general public about civil liberties- has a lot of information on issues
-represented two john does identities were subpoenaed from what they wrote on a message board |
|
first amendment
|
congress shall make no law respecting an establishment of religion, or prohibiting the free exercise therof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances
|
|
FOIA stands for
|
freedom of information act
|
|
FOIA does what
|
passed in 1966 and amended in 1974- public with means to gain access to certain government records- find out spending patterns of agency, missions and goals etc
|
|
Fair credit reporting act
|
regulates the operations of credit-reporting bureaus, including how they collect, store, and use credit information.
|
|
foreign corrupt practices act
|
allows the US department of justice and the SEC to prosecute businesses and company personnel who bribe governments, politicians, or political parties abroad.
|
|
fraud
|
crime of obtaining goods, services, or property through deception or trickery, fraudulent misrepresentations- when a person consciously decides to induce another person to rely and act on the misrepresentation
|
|
fourth amendment
|
protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees
|
|
H1-B visa
|
a visa temporarily granted by the US citizenship and immigration services for people who work in specialty occupations- maximum of 6 continuous years, must be paid same wage as US workers
|
|
IEEE stands for
|
Institute of electrical and electronics engineers
|
|
IEEE does:
|
covers fields of electrical, electronic, and information technologies and sciences- IEEE-CS, one of oldest and largest IT professional organizations, exchange of information and ideas
|
|
Identity theft and assumption deterrence act of 1998
|
congress passed to help fight identity fraud, making it a federal felony punishable by a prison sentence of 3 -25 years
|
|
lotus v. borland
|
lotus developed lotus 1-2-3 for accounting functions, borland tried to develop a program superior to lotus and lotus sued borland for copying the look and feel of the interface- borland not charged because court found the copied item, a method of operation, was not covered in copyright protection
|
|
miller v. california
|
miller- conducted a mass mailing campaign advertising adult material and was convicted of violating a California statute prohibiting the distribution of obscene material- determined what speech can be considered obscene
|
|
what 3 ways to determine speech is obscene
|
1- would average person find that the work as a whole appeals to the nonwholesome interest
2- does the work describe/depict in an offensive way, sexual conduct defined by applicable state law 3- does the work as a whole lack literary, artistic, political ,or scientific value |
|
reno v. aclu
|
criminalizing of indecency on the internet- CDA act, the law was unconstitutional because it violated free speech
|
|
privacy act of 197
|
declares that no agency of the US government can conceal the existence of any personal data record-keeping system, and that any agency that maintains such a system must publicly describe both the kinds of info in it and the manner in which the info will be used
|
|
RIAA stands for
|
Recording industry association of america
|
|
RIAA does:
|
tracks down companies whose employees illegally create digital jukeboxes by downloading tunes onto company file servers and sharing them with coworkers
|
|
RSA
|
public key encryption algorithm available since 1978, basis for security that protects web consumers and merchants
|
|
PGP
|
software that uses 128 bit encryption, standard for email
|
|
TrustE
|
independent, nonprofit initiatives that favor and industry regulated approach to data privacy- feel strict government regulations could have a negative impact on the Internets use and growth and the regulation will be costly to implement and hard to change
|
|
uniform trade secrets act
|
bring uniformity to US states in the area of trade secret law-
|
|
trade secret defined in full
|
something defined as business info that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public and is kept confidential
|
|
USPTO
|
US patent and trademark office
|
|
what does USPTO do
|
issues patents to to inventors
|