• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
Ethics
The priniples & standards that guide our behavior toward other people
Privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed w/o your consent
Confidentiality
The assurance that msgs and info are available only to those who are authorized to view them
ePolicies
Policies & procedures that address the ethical use of computers & internet usage in teh business environment (ethical comp use, info provicy, acceptable use, e-mail privacy, internet use, anti-spam policies)
Information Privacy Policy
Contains general principles regarding information privacy
Acceptable Use Policy (AUP)
A policy that a user must agree to follow in order to be provided access to a network or to the Internet
Nonrepudiation
A contractual stipulation to ensure that e-business participants do not deny(repudiate) their online actions
E-mail Privacy Policy
Details the extent to which e-mail messages may be read by others
Internet Use Policy
Contains general principals to guide the proper use of the internet
Spam
Unsolicited e-mail
Anti-spam Policy
E-mail users will not send unsolicited e-mails or spam
Information Technology Monitoring
Tracking people's activities by such measures as # of keystokes, error rate, and # of transactions processed
Information Security
A broad term encompassing the protection of info from accidental or intentional misuse by persons inside or outside an organization
Insiders
Legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident
Social Engineering
Using one's social skills to trick people into revealing access credentials or other info valuable to the attacker
Dumpster Diving
Looking through people's trash, is another way social engineering hackers obtain info
Authentication
A method for confirming users' identities
Authorization
The process of giving someone permission to do or have something
Identity Theft
The forging of someone's identity for the purpose of fraud
Phishing
A technique to gain personal info for the purpose of identity theft, usually by means of fradulent e-mail
Tokens
Small electronic devices that change user passwords automatically
Smart Card
A device that is around the same size as a credit card, containing embedded technologies that can sore info & small amounts of software to perform some limited processing
Content Filtering
Occurs when organizations use software that filters conent to prevent the transmission of unauthorized info
Encryption
Scrambles info into an alternative form that requires a key or password to decrypt the info
Public Key Encryption (PKE)
An encryption system that uses two keys: a public key that everyone can have & a private key for only the recipient
Intellectual Property
Intangible creative work that is embodied in physical form
Copyright
The legal protection afforded an expression of an idea, such as a song, video game, & some types of proprietary documents
Fair Use Doctrine
In certain situations, it is legal to use copyrighted material
Pirated Software
The unauthorized use, duplication, distribution, or sale of copyrighted software
Counterfeit Software
Software that is manufactured to look like the real thing & sold as such
Mail Bomb
Sending a massive amount of e-mail to a specific person or system resulting in filing up the recipient's disk space
Key Logger/Key Trapper Software
A program that, when installed on a comp, records every keystorke & mouse click
Hardware Key Logger
Hardware Device that captures keystokes on their journey from the keyboard to the motherboard
Cookie
Small file deposited on a hard drive by a web site containing info about customers and their web activities
Adware
Software taht generates ads that install themselves on a comp when a person downloads some other program from the internet
Sneakware/Stealthware
Software that comes hidden in free downloadable software & tracks online movements, mines the info stored on a comp, or uses a comp's CPU & storage for some task the user knows nothing about
Web Log
Consists of one line of info for every visitor to a web site & is usually sored on a web server
Clickstream
Records info about a customer during a web surfing session such as what web sites were visited, how long the visit was, what ads were viewed, & what was purchased
Info Security Plan
Describes Univ. of Denver's safeguards to protect info & data in compliance w/ the financial services modernization act of 1999
White-hat hackers
Work at the request of the system owners to find system vulnerabilities & plug the holes
Black-hat hackers
Break into other people's computer systems & man just look around or may steal & destroy info
Hactivists
Have philosophical & political reasons for breaking into systems & will often deface the web site as a protest
Script Kiddies/bunnies
Find hacking code on the internet & click-&-point thier way into systems to cause damage or spread viruses
Cracker
Hacker w/criminal intent
Cyberterrorists
Seek to cause harm to people or to destroy critical systems or info & use the internet as a weapon of mass destruction
Worm
Virus that spreads itself, not only file to file, but also from comp to comp. Difference between a virus & a worm is virus need to attach themselves to something & worms can just tunnel
Denial-of-Service Attack (DoS)
Floods a web site with so many requests for service that it slows down or crashs the site
Distributed denial-of-service attack (DDoS)
Attacks from multipel comps that flood a website with so many requests for service that it slows down or crashes. A common type is the ping of death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down
Trojan-horse virus
hides inside other software, usually as an attachment r a downloadable file
Backdoor programs
viruses that open a way into the network for future attacks
Polymorphic viruses & worms
change thier form as the propagate