Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Design to protect confidenciality integrity and availability of data |
Information security |
|
Generated in different forms from smartphones to buying patters |
Information |
|
Year hacking become an organize crime |
1990s |
|
Hacking is not considered as issue until recently |
Cybercrime |
|
Protection of computer systems |
Computer Security |
|
Four major threats |
Thef of data Vandalism Fraud Invasion of privacy |
|
Refers to the methods, tools and personnel used to defend an organization's digital assets |
Security for information system |
|
Is a combination of hardware and software and telecommunication networks that people build to collect, create and distribute useful data, typically in an organization |
Information system |
|
Software classification |
System software Application Software Procedures |
|
Rules that mandate or prohibit certain behavior |
Laws |
|
Define socially acceptable behaviors |
Ethics |
|
Extends beyond criminal or contract law |
Liability |
|
Knows the consequences of illegal or unethical actions |
Due care |
|
Make a valid effort to protect others |
Due diligence |
|
Court’s right to hear a case if a wrong is committed |
Jurisdiction |
|
Guidelines that describe acceptable and unacceptable employee behaviors Functions as organizational laws |
Policies |
|
The organization must be able to demonstrate that the relevant policy has been made readily available for review by the employee |
Dissemination |
|
represents a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people. |
Civil Law |
|
regulates the relationship between the individual and the organization, and encompasses family law, commercial law, and labor law. |
Private law |
|
also penalizes offenses against the privacy, confidentiality, integrity, and availability of computer data and systems |
Cybercrime prevention act 2012 |