Quiz Unit 3.1
Card Set Information
Quiz Unit 3.1
Quiz Unit 3.1 PM331
A term that refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.
Code of Ethics
A collection of principles that are intended to guide decision making by members of the organization.
A term that means you accept the consequences of your decisions and actions.
A term that means a determination of who is reponsible for actions that were taken.
A legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
Is Unethical and Illegal the same?
No, unethical is not necessarily illegal.
What is the Sarbanes-Oxley Act of 2002?
This law requires that public companies implement financial controls and that, to ensure accountability, executives must personally certify financial reports.
What does improvements in IT cause?
Improvesments in IT are causing an increasing number of ethical problems.
What is IT
What do Computer Networks do?
Computer networks, particularly the Internet, enable organizations to collect, integrate, and distriute enormous amounts of information on individuals, groups, and institutions.
What are Privacy Issues?
Involve collecting, storing and disseminating information about individuals.
What are Accuracy Issues?
Involve the authenticity, fidelity, and accuracy of information that is collected and processed.
What are Property Issues?
Involve the ownership and value of information.
What are Accessiblilty Issues?
They revolve around who should have access to information and whether they should have to pay for this access.
The right to be left alone and to be free of unreasonable personal intrusion.
Is the right to privacy absolute?
No, privacy must be balanced against the needs of society.
Does the public have the right to know?
Yes, the publics right to know supersedes the individuals right of privacy.
An electronic description of a use and his or her habits.
The process of compling a digital dossier on a person.
What is Customer Intimacy?
When dossiers are sold to companies that want to know their customers better.
Monitoring or tracking peoples activities with the aid of computers.
What is URL filtering?
When a company uses software to block connections to inappropriate Web sites.
Trusted versus Untrusted Network
A trusted network is any network within your organization, whereas an untrusted network is any network external to your organization.
Allow access to the Internet anywhere and anythime, they are an inherently nonsecure broadcast communications medium.
Dictates that many types of information must be protected by law.
Requires companies to notify consumers of privacy policies and to provide opt-out provisions, it also protects nonpublic financial data.
An organizations guidelines with respect to protecting the privacy of customers, clients, and employees.
Computing skills necessary to be a hacker are decreasing.
Users with fre computer skills can download and use to attack any IS connected to the internet.
Illegal activities executed on the internet.
Service Level Agreement, it spells out specific requirements and establihes a security standard.
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privilages.
Reverse Social Engineering
A type of attack in which employees approach the attacker.
Deviations in Service Quality by Providers.
Consists of situations in which a product or service is not delivered to the organization as expected.
Include dirt, dust, humidity, and static electricity.
These included floods, earthquakes, hurricanes, tornados, lightning and in some cases fire.
Include problems with hardware and or software.
What is Pod Slurping?
Plugging in a device to a USB port that downloads huge amount of information quickly and easily.
What is Dumpster Diving?
Involves the practice of rummaging through commercial or residential trash to find information that been discarded.
Crime in which someone steals the personal information of others to create a false identity and then uses it for some fraud.
The intangible property created by individuals or corporations, which is protected under trade secret, patent and copyright laws.
Intellectual work, such as a business plan, that is a company secret and is not based on public information.
What is a Patent?
A document that grants the holder exclusive rights on an invention or process for 20 years.
Single Factor Authentication
Is weak and consists of a password only.
Consists of a password plus one type of biometric identification.
Any combination of three authentication methods.
A collection of related computer system operation that can be performed by users of the system profiling.
A grant that provides the creator of intellectual property with ownership of it for the life of the creator puls 70 years.
Copying a sofware program without making payment to the owner.
Business Software Alliance
Represents the worlds commercial sofware industry.
Partnership between government and industry designed to protect the nations infrastructure.
Designed to protect all of the components of an information System.