Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
64 Cards in this Set
- Front
- Back
A civilization based on agriculture and handwork
Relatively primitive stage Lasted thousands of years Luddites opposed technology |
first wave
|
|
The Industrial Revolution
Began at the end of the 18th century and lasted about 150 years |
second wave
|
|
The Information Age
Information becomes the currency |
third wave
|
|
Necessary skill in today’s world
May be the difference between being employed or unemployed Many different jobs involve the use of computers |
computer literacy
|
|
Major ethical challenge
New class system of power The gap in the United States is shrinking Widening gap between developed and developing countries |
digital divide
|
|
Broad range of issues and standards of conduct pertaining to the use of information systems
|
computer ethics
|
|
Most ethical debates relate to what 4 things?
|
1. Information privacy
2. Information accuracy 3. Information property 4. Information accessibility |
|
In the new class system of power, power comes from?
|
knowledge
|
|
What information should you have to reveal?
|
information privacy
|
|
3 Types of Information you might want to keep private?
|
1. Social security number
2. Medical history 3. Family history |
|
Fastest growing “information” crime
Biometrics for better protection Results in bad credit for victim |
identity theft
|
|
3 Things that should be included in Privacy Policy?
|
1. What information is being gathered about you
2. How the seller will use this information 3. Whether and how you can “opt out” of these practices |
|
4 Additional Tips to Maintain your Privacy Online?
|
1. Choose Web sites monitored by independent organizations
2. Avoid having cookies left on your machine 3. Visit sites anonymously 4. Use caution when requesting confirmation e-mail |
|
Ensuring of the authenticity and fidelity of information
High costs of incorrect information Difficult to track down the person who made the mistake |
information accuracy
|
|
Who owns information about individuals?
How can this information be sold and exchanged? |
information property
|
|
Unsolicited e-mail
CAN-SPAM Act of 2003 Little protection available |
spam
|
|
Company maintaining the database with customer information legally owns it
Is free to sell it Cannot sell information it agreed not to share Must insure proper data handling practices |
data privacy statement
|
|
Text file storing Web browsing activity
Can opt for cookies not to be stored Web sites might not function properly without cookies |
cookies
|
|
Software used for data collection without the users’ knowledge
Unlikely this activity will become illegal anytime soon |
spyware
|
|
Inheritance pattern for sphingolipidoses- ?
EXCEPT- ? |
AR
EXCEPT Fabrys = x-linked |
|
Fines as high as $100,000
Some companies pay the cybersquatters to speed up the process of getting the domain |
Anti-Cybersquatting Consumer Protection Act in 1999
|
|
Technology solution to control digital content
|
digital rights management
|
|
Electronic version of physical watermarks
|
digital watermarking
|
|
Who has the right to monitor the information?
Example: e-mail capture by Carnivore |
information accessibility
|
|
Developed by the government to monitor all cyber communication
|
Carnivore
|
|
Stronger support for voice mail than for e-mail communication
No other federal or state laws protect e-mail privacy Companies should be prudent and open about their monitoring of e-mail messages and Internet usage Employees should use e-mail only as appropriate |
Electronic Communications Privacy Act
|
|
8 Practices that responsible computer use (based on work of the Computer Ethics Institute) prohibits?
|
1. Using a computer to harm others
2. Interfering with other people’s computer work 3. Snooping in other people’s files 4. Using a computer to steal 5. Using a computer to bear false witness 6. Copying or using proprietary software without paying for it 7. Using other people’s computer resources without authorization 8. Appropriating other people’s intellectual output |
|
Using a computer to commit an illegal act
Targeting a computer - unauthorized access Using a computer to commit an offense Using a computer to support a criminal activity |
computer crime
|
|
Overall trend of computer crime is?
|
declining
|
|
Using computer systems with no authority to gain such access
|
unauthorized computer access
|
|
Frequency of successful attacks in unauthorized computer access is?
|
declining
|
|
Stealing or compromising data
Gaining access to computers owned by the U.S. government Violating data belonging to financial institutions Intercepting communication between foreign countries Threatening to damage computer systems in order to extort money |
Computer Fraud and Abuse Act of 1986
|
|
Breaking into any electronic communication service is a crime
|
Electronic Communications Privacy Act of 1986
|
|
Controversial law
Investigators may monitor voice communication |
USA PATRIOT Act of 2002
|
|
Use of formal investigative techniques to evaluate digital information
Honeypots used to entice and catch hackers and crackers |
computer forensics
|
|
Example is DarkMarket
|
honeypot
|
|
Individuals gaining unauthorized access
Motivated by curiosity No intentions to do harm |
hackers
|
|
Break into computers with the intention of doing harm
|
crackers
|
|
Break into computer systems to promote political or ideological goals
|
hacktivists
|
|
Four groups of computer criminals?
|
1. Current or former employees
2. People with technical knowledge committing crimes for personal gain 3. Career criminals using computers to assist them in crimes 4. Outside crackers hoping to find information of value |
|
Making one backup copy for personal use
Sharing free software (shareware or public domain software) |
Legal Activities of Software Piracy
|
|
Making copies of purchased software for others
Offering stolen proprietary software (warez peddling) |
Illegal Activities of Software Piracy
|
|
Patents: process or machine inventions
Copyrights: creations of the mind Various copyright laws applicable to software |
Intellectual Property
|
|
3 Factors influencing piracy around the world?
|
1. Concept of intellectual property differs between countries
2. Economic reasons for piracy 3. Lack of public awareness about the issue |
|
Thousands of new forms released each month
Viruses |
Malware
|
|
Reproduce themselves
Usually delete or destroy files |
viruses
|
|
Does not destroy files
Designed to copy and send itself Brings computers down by clogging memory |
worm
|
|
Does not copy itself
Often remains hidden to the user Performs functions such as establishing user accounts |
trojan horse
|
|
Variations of Trojan horse
Do not disrupt computer function until triggering event/operation |
logic bombs and time bombs
|
|
Collection of zombie computers, often used for spam, phishing, or denial of service attacks
|
Botnet
|
|
A typical cyberattack supply chain consists of what 6 players?
|
1. Programmer
2. Phisher 3. Cracker 4. Bot Herder 5. Collector 6. Mule herder |
|
False messages circulated online
New viruses (that don’t exist) Collection of funds for certain group Possible consequences |
Internet Hoaxes
|
|
Crime that broadly refers to the use of a computer to communicate
|
cyber harassment
|
|
Making false accusations that damage reputation
Gaining information on a victim by monitoring online activates Using the Internet to encouraging other to harass a victim Attacking data and equipment of a victim Using the Internet to place false goods or orders |
cyber stalking
|
|
The deliberate cause of emotional distress to a victim
|
cyber bullying
|
|
Typically target vulnerable population for sexual or financial purposes
Social networking sites have become playground Most social networking and chat sites provide ways to report abuse |
online predator
|
|
Military’s attempt to disrupt or destroy another country’s information and communication systems
Goal is to diminish opponent’s communication capabilities Used in concert with traditional methods |
cyberwar
|
|
independent citizens that attack perceived enemies of the state
|
Patriot Hackers
|
|
In 2006 the U.S. Air Force launched?
|
Cyber Command
|
|
Governments not involved
Can be launched from anywhere in the world Goal is to cause fear, panic, and destruction Will likely become weapon of choice |
cyberterrorism
|
|
Popular target for hackers and crackers
60-90 attempts a day Some successful attacks |
The U.S. Department of Defense
|
|
3 Obstacles to Cyberterrorism?
|
1. Computer systems are complex and attacks may not have desired outcome
2. Fast-changing security measures 3. Cyberattacks rarely cause physical harm to victims |
|
Increasing dependence on technology
Increasing possibilities of cyberterrorism International laws and treaties must evolve However: likelihood of large attacks is small |
The Globalization of Terrorism
|
|
3 Required Components of successful large terrorist attack?
|
1. Intelligence information
2. Years of preparation 3. At least $200 million |