Quiz Unit 3.1

Card Set Information

Quiz Unit 3.1
2011-04-10 18:28:33

Quiz Unit 3.1 PM331
Show Answers:

  1. Ethics
    A term that refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.
  2. Code of Ethics
    A collection of principles that are intended to guide decision making by members of the organization.
  3. Responsibility
    A term that means you accept the consequences of your decisions and actions.
  4. Accountability
    A term that means a determination of who is reponsible for actions that were taken.
  5. Liability
    A legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
  6. Is Unethical and Illegal the same?
    No, unethical is not necessarily illegal.
  7. What is the Sarbanes-Oxley Act of 2002?
    This law requires that public companies implement financial controls and that, to ensure accountability, executives must personally certify financial reports.
  8. What does improvements in IT cause?
    Improvesments in IT are causing an increasing number of ethical problems.
  9. What is IT
    Information Technology
  10. What do Computer Networks do?
    Computer networks, particularly the Internet, enable organizations to collect, integrate, and distriute enormous amounts of information on individuals, groups, and institutions.
  11. What are Privacy Issues?
    Involve collecting, storing and disseminating information about individuals.
  12. What are Accuracy Issues?
    Involve the authenticity, fidelity, and accuracy of information that is collected and processed.
  13. What are Property Issues?
    Involve the ownership and value of information.
  14. What are Accessiblilty Issues?
    They revolve around who should have access to information and whether they should have to pay for this access.
  15. Privacy
    The right to be left alone and to be free of unreasonable personal intrusion.
  16. Is the right to privacy absolute?
    No, privacy must be balanced against the needs of society.
  17. Does the public have the right to know?
    Yes, the publics right to know supersedes the individuals right of privacy.
  18. Digital Dossier
    An electronic description of a use and his or her habits.
  19. Profiling
    The process of compling a digital dossier on a person.
  20. What is Customer Intimacy?
    When dossiers are sold to companies that want to know their customers better.
  21. Electronic Surveillance
    Monitoring or tracking peoples activities with the aid of computers.
  22. What is URL filtering?
    When a company uses software to block connections to inappropriate Web sites.
  23. Trusted versus Untrusted Network
    A trusted network is any network within your organization, whereas an untrusted network is any network external to your organization.
  24. Wireless Technologies
    Allow access to the Internet anywhere and anythime, they are an inherently nonsecure broadcast communications medium.
  25. Governmental Legislation
    Dictates that many types of information must be protected by law.
  26. Gramm-Leach-Bliley Act
    Requires companies to notify consumers of privacy policies and to provide opt-out provisions, it also protects nonpublic financial data.
  27. Privacy Policies
    An organizations guidelines with respect to protecting the privacy of customers, clients, and employees.
  28. Hacker
    Computing skills necessary to be a hacker are decreasing.
  29. Scripts
    Users with fre computer skills can download and use to attack any IS connected to the internet.
  30. Cybercrime
    Illegal activities executed on the internet.
  31. SLA
    Service Level Agreement, it spells out specific requirements and establihes a security standard.
  32. Social Engineering
    Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privilages.
  33. Reverse Social Engineering
    A type of attack in which employees approach the attacker.
  34. Deviations in Service Quality by Providers.
    Consists of situations in which a product or service is not delivered to the organization as expected.
  35. Enviornmental Hazards
    Include dirt, dust, humidity, and static electricity.
  36. Natural Diasters
    These included floods, earthquakes, hurricanes, tornados, lightning and in some cases fire.
  37. Technical Failures
    Include problems with hardware and or software.
  38. What is Pod Slurping?
    Plugging in a device to a USB port that downloads huge amount of information quickly and easily.
  39. What is Dumpster Diving?
    Involves the practice of rummaging through commercial or residential trash to find information that been discarded.
  40. Identity Theft
    Crime in which someone steals the personal information of others to create a false identity and then uses it for some fraud.
  41. Intellectual property
    The intangible property created by individuals or corporations, which is protected under trade secret, patent and copyright laws.
  42. Trade Secret
    Intellectual work, such as a business plan, that is a company secret and is not based on public information.
  43. What is a Patent?
    A document that grants the holder exclusive rights on an invention or process for 20 years.
  44. Single Factor Authentication
    Is weak and consists of a password only.
  45. Two-factor Authentication
    Consists of a password plus one type of biometric identification.
  46. Three-factor Authentication
    Any combination of three authentication methods.
  47. Privilege
    A collection of related computer system operation that can be performed by users of the system profiling.
  48. Copyright
    A grant that provides the creator of intellectual property with ownership of it for the life of the creator puls 70 years.
  49. Priacy
    Copying a sofware program without making payment to the owner.
  50. BSA
    • Business Software Alliance
    • Represents the worlds commercial sofware industry.
  51. NIPC
    Partnership between government and industry designed to protect the nations infrastructure.
  52. Security Controls
    Designed to protect all of the components of an information System.