Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
Ethics
|
The priniples & standards that guide our behavior toward other people
|
|
Privacy
|
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed w/o your consent
|
|
Confidentiality
|
The assurance that msgs and info are available only to those who are authorized to view them
|
|
ePolicies
|
Policies & procedures that address the ethical use of computers & internet usage in teh business environment (ethical comp use, info provicy, acceptable use, e-mail privacy, internet use, anti-spam policies)
|
|
Information Privacy Policy
|
Contains general principles regarding information privacy
|
|
Acceptable Use Policy (AUP)
|
A policy that a user must agree to follow in order to be provided access to a network or to the Internet
|
|
Nonrepudiation
|
A contractual stipulation to ensure that e-business participants do not deny(repudiate) their online actions
|
|
E-mail Privacy Policy
|
Details the extent to which e-mail messages may be read by others
|
|
Internet Use Policy
|
Contains general principals to guide the proper use of the internet
|
|
Spam
|
Unsolicited e-mail
|
|
Anti-spam Policy
|
E-mail users will not send unsolicited e-mails or spam
|
|
Information Technology Monitoring
|
Tracking people's activities by such measures as # of keystokes, error rate, and # of transactions processed
|
|
Information Security
|
A broad term encompassing the protection of info from accidental or intentional misuse by persons inside or outside an organization
|
|
Insiders
|
Legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident
|
|
Social Engineering
|
Using one's social skills to trick people into revealing access credentials or other info valuable to the attacker
|
|
Dumpster Diving
|
Looking through people's trash, is another way social engineering hackers obtain info
|
|
Authentication
|
A method for confirming users' identities
|
|
Authorization
|
The process of giving someone permission to do or have something
|
|
Identity Theft
|
The forging of someone's identity for the purpose of fraud
|
|
Phishing
|
A technique to gain personal info for the purpose of identity theft, usually by means of fradulent e-mail
|
|
Tokens
|
Small electronic devices that change user passwords automatically
|
|
Smart Card
|
A device that is around the same size as a credit card, containing embedded technologies that can sore info & small amounts of software to perform some limited processing
|
|
Content Filtering
|
Occurs when organizations use software that filters conent to prevent the transmission of unauthorized info
|
|
Encryption
|
Scrambles info into an alternative form that requires a key or password to decrypt the info
|
|
Public Key Encryption (PKE)
|
An encryption system that uses two keys: a public key that everyone can have & a private key for only the recipient
|
|
Intellectual Property
|
Intangible creative work that is embodied in physical form
|
|
Copyright
|
The legal protection afforded an expression of an idea, such as a song, video game, & some types of proprietary documents
|
|
Fair Use Doctrine
|
In certain situations, it is legal to use copyrighted material
|
|
Pirated Software
|
The unauthorized use, duplication, distribution, or sale of copyrighted software
|
|
Counterfeit Software
|
Software that is manufactured to look like the real thing & sold as such
|
|
Mail Bomb
|
Sending a massive amount of e-mail to a specific person or system resulting in filing up the recipient's disk space
|
|
Key Logger/Key Trapper Software
|
A program that, when installed on a comp, records every keystorke & mouse click
|
|
Hardware Key Logger
|
Hardware Device that captures keystokes on their journey from the keyboard to the motherboard
|
|
Cookie
|
Small file deposited on a hard drive by a web site containing info about customers and their web activities
|
|
Adware
|
Software taht generates ads that install themselves on a comp when a person downloads some other program from the internet
|
|
Sneakware/Stealthware
|
Software that comes hidden in free downloadable software & tracks online movements, mines the info stored on a comp, or uses a comp's CPU & storage for some task the user knows nothing about
|
|
Web Log
|
Consists of one line of info for every visitor to a web site & is usually sored on a web server
|
|
Clickstream
|
Records info about a customer during a web surfing session such as what web sites were visited, how long the visit was, what ads were viewed, & what was purchased
|
|
Info Security Plan
|
Describes Univ. of Denver's safeguards to protect info & data in compliance w/ the financial services modernization act of 1999
|
|
White-hat hackers
|
Work at the request of the system owners to find system vulnerabilities & plug the holes
|
|
Black-hat hackers
|
Break into other people's computer systems & man just look around or may steal & destroy info
|
|
Hactivists
|
Have philosophical & political reasons for breaking into systems & will often deface the web site as a protest
|
|
Script Kiddies/bunnies
|
Find hacking code on the internet & click-&-point thier way into systems to cause damage or spread viruses
|
|
Cracker
|
Hacker w/criminal intent
|
|
Cyberterrorists
|
Seek to cause harm to people or to destroy critical systems or info & use the internet as a weapon of mass destruction
|
|
Worm
|
Virus that spreads itself, not only file to file, but also from comp to comp. Difference between a virus & a worm is virus need to attach themselves to something & worms can just tunnel
|
|
Denial-of-Service Attack (DoS)
|
Floods a web site with so many requests for service that it slows down or crashs the site
|
|
Distributed denial-of-service attack (DDoS)
|
Attacks from multipel comps that flood a website with so many requests for service that it slows down or crashes. A common type is the ping of death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down
|
|
Trojan-horse virus
|
hides inside other software, usually as an attachment r a downloadable file
|
|
Backdoor programs
|
viruses that open a way into the network for future attacks
|
|
Polymorphic viruses & worms
|
change thier form as the propagate
|