ISQS Final Delgadillo
Terms
undefined, object
copy deck
- Who has a responsibility to promote ethical uses of information technology in the workplace
- Business Professionals
- Proportionality
- The good achieved by the technology must outweigh the harm or risk
- Informed Consent
- Those affected by the technology should understand the risks
- Justice
- The benefits and burdens of the technology should be distributed fairly
- Minimized Risk
- even if judged acceptable by the other 3 guidelines, the technology must be implemented so as to avoid all unnecessary risk
- Computer Crime
-
The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources.
The unauthorized release of information.
Using or conspiring to use computer or network resources illegally to obtain information or tangible property. - Hacking
- the unauthorized access and use of networked computer systems
- Denial of Service (attack)
- Hammering a website's equipment with too many requests for information
- Scans
- Widespread probes of the internet to determine types of computers, services, and connections
- Sniffer
- Programs that search individual packets of data as they pass through the internet
- Spoofing
- Faking an email address to trick users into passing along critical information like passwords or credit card numbers
- Trojan Horse
- A program that, unknown to the user, contains instructions that exploit a know vulnerability in some software.
- Back doors
- A hidden point of entry to be used in case the original entry point has been detected or blocked
- Malicious Applets
- Tiny Java programs that misuse your computer's resources, modify files on the hard disk, send fake email, or steal passwords
- War Dialing
- Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection
- Logic Bombs
- An instruction in a computer program that triggers a malicious act
- Buffer Overflow
- A technique for crashing by sending too much data to the buffer in a computer's memory
- Password Crackers
- software that can guess passwords
- Social engineering
- Gaining access to computer systems by talking unsuspecting company employees out of valuable information such as passwords
- Dumpster Diving
- Sifting through a company's garbage to find information to help break into their computers
- Cyber Theft
- Computer crime involving the theft of money
- Freedom of information
- right of people to know about information that others may want to keep private
- Freedom of speech
- The right of people to express their opinion on matters
- Freedom of the press
- The right of people to debate on bulletin boards or blogs
- Spamming
- Indiscriminate sending of unsolicited email messages to many internet users
- Flaming
- Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the internet or online services
- General email abuses in the workplace
- legal but unethical
- Leisure use of the internet in the workplace
- legal
- Usage of external isps/moonlighting
- illegal and unethical
- Intellectual Property
- copyrighted material
- Computer virus
- program code that cannot work without being inserted into another program
- worm
- distinct program that can run unaided
- Viruses and worms
- both copy annoying or destructive routines into networked computers often spreading via email or file attachments
- How do viruses and worms work?
- A virus copies itself into the files of the operating system then spreading to the primary memory and copies itself to the hard disk, flash drives etc and then spreading through email or infected devices
- Adware
- software that purports to serve a useful purpose but allows internet advertisers to display advertisements
- Spyware
- adware that employs the user's internet connection in the background without your permission or knowledge
- Cookies
-
Information about you can be captured legitimately and automatically each time you visit a website, recorded as a cookie
The website owners may sell the information from cookies to third parties
Cookies can also be intercepted or retrieved from your hard disk by hackers - Opt-In
- You explicitly consent to allow data to be compiled about them
- Opt-out
- Data can be compiled about you unless you specifically request it not be
- Violation of Privacy
-
Accessing individuals' private email conversations and computer records
Collecting and sharing information about individuals gained from their visits to internet websites - Computer Monitoring
-
Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places
Computers used to monitor the productivity and behavior of employees as they work - Computer Matching
- Using customer information gained from many sources to market additional business
- Unauthorized Personal Files
- Collecting telephone numbers, email addresses, credit card numbers, and other personal information to build individual customer profiles
- Protecting your privacy
-
Email can be encrypted
ISP can be asked not to sell your name and personal info to mailing lists providers and other marketers
Decline to reveal personal data and interests on online service and website user profiles - Three types of encryption keys
- Symmetric, Asymmetric, Three Pass Protocol Assymetric
- Protections from intrusion online
-
Firewall Software, Dedicated server, router
Protects by screening all network traffic and serving as a safe transfer point for access to and from other networks