This site is 100% ad supported. Please add an exception to adblock for this site.

ISQS Final Delgadillo

Terms

undefined, object
copy deck
Who has a responsibility to promote ethical uses of information technology in the workplace
Business Professionals
Proportionality
The good achieved by the technology must outweigh the harm or risk
Informed Consent
Those affected by the technology should understand the risks
Justice
The benefits and burdens of the technology should be distributed fairly
Minimized Risk
even if judged acceptable by the other 3 guidelines, the technology must be implemented so as to avoid all unnecessary risk
Computer Crime
The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources.
The unauthorized release of information.
Using or conspiring to use computer or network resources illegally to obtain information or tangible property.

Hacking
the unauthorized access and use of networked computer systems
Denial of Service (attack)
Hammering a website's equipment with too many requests for information
Scans
Widespread probes of the internet to determine types of computers, services, and connections
Sniffer
Programs that search individual packets of data as they pass through the internet
Spoofing
Faking an email address to trick users into passing along critical information like passwords or credit card numbers
Trojan Horse
A program that, unknown to the user, contains instructions that exploit a know vulnerability in some software.
Back doors
A hidden point of entry to be used in case the original entry point has been detected or blocked
Malicious Applets
Tiny Java programs that misuse your computer's resources, modify files on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection
Logic Bombs
An instruction in a computer program that triggers a malicious act
Buffer Overflow
A technique for crashing by sending too much data to the buffer in a computer's memory
Password Crackers
software that can guess passwords
Social engineering
Gaining access to computer systems by talking unsuspecting company employees out of valuable information such as passwords
Dumpster Diving
Sifting through a company's garbage to find information to help break into their computers
Cyber Theft
Computer crime involving the theft of money
Freedom of information
right of people to know about information that others may want to keep private
Freedom of speech
The right of people to express their opinion on matters
Freedom of the press
The right of people to debate on bulletin boards or blogs
Spamming
Indiscriminate sending of unsolicited email messages to many internet users
Flaming
Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the internet or online services
General email abuses in the workplace
legal but unethical
Leisure use of the internet in the workplace
legal
Usage of external isps/moonlighting
illegal and unethical
Intellectual Property
copyrighted material
Computer virus
program code that cannot work without being inserted into another program
worm
distinct program that can run unaided
Viruses and worms
both copy annoying or destructive routines into networked computers often spreading via email or file attachments
How do viruses and worms work?
A virus copies itself into the files of the operating system then spreading to the primary memory and copies itself to the hard disk, flash drives etc and then spreading through email or infected devices
Adware
software that purports to serve a useful purpose but allows internet advertisers to display advertisements
Spyware
adware that employs the user's internet connection in the background without your permission or knowledge
Cookies
Information about you can be captured legitimately and automatically each time you visit a website, recorded as a cookie

The website owners may sell the information from cookies to third parties

Cookies can also be intercepted or retrieved from your hard disk by hackers



Opt-In
You explicitly consent to allow data to be compiled about them
Opt-out
Data can be compiled about you unless you specifically request it not be
Violation of Privacy
Accessing individuals' private email conversations and computer records

Collecting and sharing information about individuals gained from their visits to internet websites

Computer Monitoring
Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places

Computers used to monitor the productivity and behavior of employees as they work

Computer Matching
Using customer information gained from many sources to market additional business
Unauthorized Personal Files
Collecting telephone numbers, email addresses, credit card numbers, and other personal information to build individual customer profiles
Protecting your privacy
Email can be encrypted

ISP can be asked not to sell your name and personal info to mailing lists providers and other marketers

Decline to reveal personal data and interests on online service and website user profiles



Three types of encryption keys
Symmetric, Asymmetric, Three Pass Protocol Assymetric
Protections from intrusion online
Firewall Software, Dedicated server, router

Protects by screening all network traffic and serving as a safe transfer point for access to and from other networks

Deck Info

46

tipposan

permalink