• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/52

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

52 Cards in this Set

  • Front
  • Back
The principles and standards that guide our behavior toward other people
Ethics
Includes Privacy and confidentialiry
ePolicies
Deleting an e-mail from the recipient's computer does not delete it from the sender's computer or the provider's computers.
E-mail privacty policy
What has no ethics, does not care how it is used, will not stop itself from sending spam, viruses, or highly-sensitive information, and cannot delete or preserve itself?
Information
Individuals copy, use, and distribute software; employees search organizational databases for sensitive corporate and personal information; organiztions collect, buy, and use info without checking the validity or accuracy of the info; individuals create and spread viruses that cause trouble for those using and maintaining IT systems; individuals hack into computer systems to steal proprietary info; employees destroy or steal proprietary organization info such as schematics, sketches, customer lists, and reports.
Examples of Questionable Information Technology use.
Key logger or key trapper software, hardware key logger, cookie, adware, spyware, web log, clickstream
Common Monitoring Technologies
Employee absenteeism, lower job satisfaction, psychological reactance
Employee Monitoring Effects
Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context or effective decisions and actions.
Knowledge Management
Supports the capturing, organization, and dissemination of knowlege (i.e. know-how) throughout an organization.
Knowledge Management Systems
Raw Information
Data
Putting data together
Information
What you do with information
Knowledge
Hard knowledge; data
Explicit Knowledge
In your head, thoughts, decision process
Tacit Knowledge
Telecommuting, online meetings, remote projects, deploying applications
KM Applications
KMS, CMS, WMS, GS
Collaboration Systems
provides tools to manage the creation, storage, and publication of information in a collaborative environment.
Content management
Defines all the steps or business rules, from beginning to end, required for a business process.
Workflow
facilitate the automation and management of business processes and control the movement of work through the business process.
Workflow Management Systems
Synchronous
Same Time
Asynchronous
Different Time
What is the recommended way to implement information security lines of defense?
People first, technology second
What is the most secure type of authentication?
Combination of all of the above: finger print, password/username, etc.
Which is not one of the three primary information security areas?
Detection and Resistance
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
Sarbanes-Oxley Act
What are the principles and standards that guide our behavior toward other people?
ethics
which of the following isn't included in the four quadrants of ethical and legal behavior?
None of the above
T/F: Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
True
T/F: A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.
True
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Information Security
First Line of Defense
People
Second line of defense
Technology
Social engineering, Firewalls
Ways to defend people
Authentication & Authorization, Prevention & Resistance, Detection & Response
Ways to defend technology
Smart card & Biometrics
Examples of Information Security
Sends the same public key to all customers and uses a private key to decrypt the information received
Encryption
Unsolicited email, often of a commercial nature, send indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail.
Spam
The practice of conning people into revealing sensitive data on a computer system, often on the Internet
Social engineering
Identifies rules to maintain Information security
Security Policy
details how an organization will implement the security policy
Security Plan
Username/Password, fingerprint, smart card
Authentication & Authorization
the forging of a persons identity in order to perform a fraud
Identity theft
technique to gain personal information for the purpose of identity theft
phishing
scrambles information
Encryption
hardware and software that guards info leaving and entering a system
Firewalls
a person knowledgable of computers that uses their knowledge in order to invade others computer
hacker
intended to harm content
virus
a program that appears to be legimate but is not. It will later cause trouble
Trojan horse
paris hilton
ex. of social engineering
What are the possible ethical issues that can arise from internet security?
an individual might take a course on hacking just to learn how to hack.
Gang of hackers
ShadowCrew WebMob
Security Connections
1. Behavior 2. Anti-virus, anti-spyware, and firewalls 3. Physical controls and system controls 4. Encryption