• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Design to protect confidenciality integrity and availability of data

Information security

Generated in different forms from smartphones to buying patters

Information

Year hacking become an organize crime

1990s

Hacking is not considered as issue until recently

Cybercrime

Protection of computer systems

Computer Security

Four major threats

Thef of data


Vandalism


Fraud


Invasion of privacy

Refers to the methods, tools and personnel used to defend an organization's digital assets

Security for information system

Is a combination of hardware and software and telecommunication networks that people build to collect, create and distribute useful data, typically in an organization

Information system

Software classification

System software


Application Software


Procedures

Rules that mandate or prohibit certain behavior

Laws

Define socially acceptable behaviors

Ethics

Extends beyond criminal or contract law

Liability

Knows the consequences of illegal or unethical actions

Due care

Make a valid effort to protect others

Due diligence

Court’s right to hear a case if a wrong is committed

Jurisdiction

Guidelines that describe acceptable and unacceptable employee behaviors Functions as organizational laws

Policies

The organization must be able to demonstrate that the relevant policy has been made readily available for review by the employee

Dissemination

represents a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people.

Civil Law

regulates the relationship between the individual and the organization, and encompasses family law, commercial law, and labor law.

Private law

also penalizes offenses against the privacy, confidentiality, integrity, and availability of computer data and systems

Cybercrime prevention act 2012