• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/71

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

71 Cards in this Set

  • Front
  • Back

Acceptable use policy (AUP)

A policy that a user must agree to follow in order to be provided access to a network or to the Internet.
Adware

Software that generates ads that install themselves on a computer when a person downloads some other program from the internet.

Anti-spam policy
States that e-mail users will not send unsolicited e-mails (or spam).
Authentication
A method for confirming users' identities.
Authorization
The process of giving someone permission to do or have something.
Backdoor program
Viruses that open a way into the network for future attacks.
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Black-hat hacker
Breaks into other people's computer systems and may just look around or steal and destroy information
Clickstream
Records information about a customer during a Web surfing session such as what Web sites were visited, how long the visit was, what ads were viewed, and what was purchased.
Confidentiality

The assurance that messagse and information are available only to those who are authorized to view them.

Content filtering
Occurs when organizations use software that filters content to prevent the transmission of unauthorized information.
Cookie
A small file deposited on a hard drive by a Web site containing information about customers and their Web activities
Copyright
The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
Counterfeit software
Software that is manufactured to look like the real thing and sold as such.
Cracker
A hacker with criminal intent.
Cyberterrorist
Seeks to cause harm to people or to destroy critical systems or information nand use the Internet as a weapon of mass destruction.
Denial-of-service attack (DoS)

Floods a Web site with so many requests for service that it slows down or crashes the site.

Distributed denial-of-serive attack (DDoS)
Attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes
Elevation of privelege
Process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
E-mail privacy policy
Details the extent to which e-mail messages may be read by others.
Cyberterrorist
Seeks to cause harm to people or to destroy critical systems or information nand use the Internet as a weapon of mass destruction.
Encryption
Scrambles information into an alternative form that requires a key or password to decrypt the information.
ePolicies
Policies and procedures that address the ethical use of computer and Internet usage in the business environment.
Ethical computer use policy
Contains general principles to guide computer user behavior.
Ethics
Principles and standards that guide our behavior toward other people.
Fair use doctrine
In certain situations, it is legal to use copyrighted material.
Firewall

Hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Hacker
People very knowledgeable about computers who use their knowledge to invade other people's computers.
Hactivist
Person with philosophical and political reasons for breaking into systesm and will often deface the Web site as a protest.
Hardware key logger
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Hoaxes

Attack computer systems by transmitting a virus hoax, with a real virus attached.

Identity theft
The forging of someone's identity for the purpose of fraud.
Information privacy policy
Contains general principles regarding information privacy.
Information security

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Information security plan
Details how an organization will implement the information security policies.
Information security policies
Identifies the rules required to maintain information security.
Information technology monitoring
Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Insider

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Intellectual property
Intangible creative work that is embodied in physical form.

Internet use policy

Contains general principles to guide the proper use of the internet.
Intrusion detection software (IDS)
Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm.
Key logger software (key trapper)
A program that, when installed on a computer, records every keystroke and mouse click
Mail bomb
Sends a massive amount of e-mail to a specific person or system resulting in filling up the recipient's disk space, which, in some cases, may be too much for the server to handle and may cause the server to stop functioning.
Malicious code

Includes a variety of threats such as viruses, worms, and Trojan horses.

Nonrepudiation
A contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions.
Packet tampering
Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network.
Phishing
Technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
Pirated software
The unauthorized use, duplication, distribution, or sale of copyrighted software.
Polymorphic virus and worm
Change their form as they propagate.
Privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Public key encryption (PKE)

Encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
Script kiddies or script bunnies
Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Smart card
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Sniffer
A program or device that can monitor data traveling over a network.
Social engineering
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker.
Spam
Unsolicited e-mail.

Spoofing

The forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.

Spyware (sneakware or stealthware)

Software that come shidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about.
Token
Small electronic devices that change user passwords automatically.
Trojan-horse virus
Hides inside other software, usually an attachment or a downloadable file.
Virus
Software written with malicious intent to cause annoyance or damage.
Web log
Consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
White-hat hacker
Works at the request of the system owners tofind system vulnerabilities and plug the holes.

Worm

A type of virus that spreads itself, not only from file to file, but also from computer to computer.

Information Ethics

the ethical and moral issues arising form the development and use of information technologies and systems, as well as, the creation collection duplication, distribution and processing of information itself.

Technology related Ethical issues -

Intellectual property


copyright


fair dealing


pirated software


counterfeit software

Primary reasons privacy issues reduce trust for ebusiness

Loss of personal privacy


privacy policy


Individuals form the only ethical component of MIS

-copy use and distribute software.


-Employees search organizational databases for sensitive corporate and personal information.


-Organizations collect, buy, and use information without checking the validity of accuracy of the information.

Your responsibilities under PIPEDA (Personal Information and Protection Electronic Documents Act)

-Accountability


-Identifying purposes - reason for collecting info


-Consent


-Limiting collection


-Limiting use, disclosure and retention


-Accuracy


-Safeguards


-Openness


-Individual Access


-Challenging Compliance

Exceptions - to PIPEDA

-journalistic, artistic or literary purposes


- benefits the individual


-contribute to legal investigation or aid in an emergency


- aids matters of legal investigation


Types of personal information covered by PIPEDA

-pension and employment insurance files


- medical records


- tax records


- security clearance


- student loan applications


-military records