IT - Computer Ethics

Card Set Information

Author:
Camskie
ID:
308560
Filename:
IT - Computer Ethics
Updated:
2015-09-26 12:01:05
Tags:
IT
Folders:

Description:
Computer Ethics
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Camskie on FreezingBlue Flashcards. What would you like to do?


  1. Refers to any crime that involves a computer and a network.
    Computer crime, or Cybercrime
  2. Refers, more precisely, to criminal exploitation of the Internet.
    Netcrime
  3. Examples of crimes that primarily target computer networks or devices would include:
    • Computer viruses
    • Denial-of-service attacks
    • Malware (malicious code)
  4. Examples of crimes that merely use computer networks or devices would include:
    • Cyberstalking
    • Fraud and identity theft
    • Information warfare
    • Phishing scams
  5. Consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.
    Malware, short for malicious software
  6. ____ is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
    Cyberstalking
  7. Normally involves mass mailing a large number of email accounts with an email that fraudulently attempts to instruct the receiver to verify sensitive account information by logging on to a site or including it in a return email link to the sender to authenticate that they are the authorized user of that account.
    Phishing
  8. A deviant program that attaches itself to computer systems and destroys or corrupts data.
    Virus
  9. Are computer programs, developed by (unethical) programmers, that destroy or later data stored on disk or that otherwise interfere with the operation of your computer.
    Viruses
  10. A program that copies itself repeatedly into memory or onto a disk drive until no more space is left.
    Worm
  11. Examples of worm :
    • Folder.htt 
    • Desktop.htt
  12. ___ is that part of the system software containing most of the instructions for booting, or powering up, the system.
    Boot Sector
  13. ___ replaces these boot instructions with some of its own.
    Boot-sector Virus
  14. ___ attach themselves to executable files – those that actually begin a program.
    File virus
  15. In DOS, these files caused by File Virus have the extensions :
    • .com
    • .exe
  16. ___ covertly places illegal, destructive instructions in the middle of a legitimate program, such as a computer game.
    Trojan Horse
  17. ___ differ from other viruses in that they are set to go off at a certain date and time.
    Logic bombs, or simply bombs
  18. ____ of which there are several kinds, can mutate and change form just as human viruses can. These are especially troublesome because they can change their profile, making existing antiviral technology ineffective.
    Polymorphic Virus
  19. These viruses take advantage of a procedure in which miniature programs, known as macros, are embedded inside common data files, such as those created by e-mail or spreadsheets, which are sent over computer networks. Such documents are typically ignored by anti-virus software.
    —Macro Virus
  20. ___ is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware, or that installs other malware
    Rogue security software (or rogueware)
  21. The two main categories of Rogue security software :
    • FALSE ALARM Rogueware
    • BAD COP Rogueware
  22. This type dupes you into believing that your system is infected by scanning your hard drive and detecting threats that do not exist or sometimes identifying cookies as security threats.
    FALSE ALARM Rogueware
  23. This type of rogueware encourages you to run a system scan which in actual fact downloads some malware onto your system, which is then detected and can only be removed by purchasing the Removal software from the same company.
    BAD COP Rogueware
  24. ___ refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement varies.
    Copyright infringement of software (often referred to as software piracy)
  25. “ AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY CODE  AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE,  PROVIDING FOR ITS POWERS AND FUNCTIONS, AND FOR OTHER PURPOSES”.
    • INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES 
    • [Republic Act No. 8293]
  26. ___ (which protects music, movies, computer programs, and video games) is an example of such (INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES).
    Optical Media Act
  27. AN ACT REGULATING THE ISSUANCE AND USE OF ACCESS DEVICES, PROHIBITING FRAUDULENT ACTS COMMITTED RELATIVE THERETO, PROVIDING PENALTIES AND FOR OTHER PURPOSES.
    REPUBLIC ACT NO. 8484
  28. A secret word or string of characters that is used for authentication, to prove identity or gain access to a resource
    Password
  29. ___ is a type of password.
    an access code
  30. A device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
    Firewall
  31. The process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
    Encryption
  32. The result of the process is encrypted information (in cryptography, referred to as ________)
    ciphertext
  33. Five common-sense techniques and strategies to solve common computer hardware problems:
    • Trial-and-error
    • "It's the cable, s-----."
    • Don't be frustrated!
    • Take notes!
    • Take a look?
  34. Here are some rules which should help you to avoid shock hazards:
    • Always turn off the equipment and unplug it before you begin to work.
    • Be especially careful when working with those parts of the equipment that carry high voltage
    • Don’t work when you’re tired or rushed.
    • Try to do the work with one hand.  This “one-hand rule” reduces the chance that a current will flow through the main part of your body.

What would you like to do?

Home > Flashcards > Print Preview