This site is 100% ad supported. Please add an exception to adblock for this site.

Intro to Information Systems chapter 9

Terms

undefined, object
copy deck
the practice of talking a critical computer password out of an individual
social engineering
searching through the garbage for important pieces of information that can help crack an organization's computers or be used to convince someone at the company to give access to the computers
dumpster diving
A crime in which an imposter obtains key pieces of personal identification information in order to impersonate someone else
idenity theft
a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems
criminal hacker (cracker)
a program that attaches itself to other programs
virus
Functions as an independent program, replicating its own program files until it destroys other systems and programs or interrupts the operation of computer systems and networks
a worm
designed to "explode" or execute at a specified time and date
logic bomb
a program that appears to be useful but actually masks a destructive program
trojan horse
a small program hidden in a network or a computer system that records identification numbers and passwords
password sniffer
the act of illegally duplicating software
software piracy
Illegally gaining access to and using the internet
internet piracy
Provides another layer of protection in the event that an intruder gets past the outer security layers-passwords, security procedures and the corporate firewall
Intrusion detection system
These security opertaions monitor and maintain network security hardware and software
Managed security service providers
Enables users of an unsecure public network such as the Internet to securely and privately exchange data throught the use of a public and a prvate cryptographic key pair that is obtained and shared through a trusted authority
Public Key ingrastructure
the measurement of a living trait, whether it be physical or behavior
biometrics
Programs or utilities that prevent viruses and recover from them if they infect a computer
antivirus program
A system to prtect individuals from harmful or objectionable internet content while safeguarding the free-speech rights of others
ICRA rating system
The right to be left alone
Privacy Act of 1974
This act requires ISP's and telephone companies to turn over customer info without a court order if related to terrorism
USA Patriot Act
A screening technology that shields users from Web sites that don't provide the level of privacy protection they desire
P3P, Platform for Privacy Preferences
An injury that can be caused by working with computer keyboards and other equipment
Repetitive motion disorder
Included but not limited to tendonitis, tennis elbow, the inability to hold objects and sharp pain in fingers
Repetitive stress injury
the aggravation of the pathway for nerves that travel through the wrist
carpal tunnel syndrome
the study of designing and positioning computer equipment for employee health and safety
ergonomics

Deck Info

24

permalink