Capstone Exam Flashcards
Still adding information from the study materials provided
Define
Ethical Relativism
Ethics
No universal standards of right and wrong.
Define
Subjective Relativism
Ethics
Each person decides right and wrong for themselves. Allows rationalizing. Not workable
Define
Cultural Relativism
Ethics
Depends on society’s moral guidelines. Arrogant for one society to judge another. Not workable
Define
Divine Command Theory
Ethics
Follow Bible, bad is against God’s will. Not workable in secular society.
Define
Ethical Egoism
Ethics
Everyone focus on own self interest. Take a guess if its workable
Define
Kantianism
Ethics
People’s actions ought to be guided by universal moral laws, which must be based on reason. Only thing that doesn’t need qualification is good will. Dutifullness. Sometimes can’t resolve between two perfect duties. Weak, but workable.
Define
Act Utilitarianism
Ethics
Good if benefits exceeds harm, bad if reverse. Greatest happiness principle. Consequentialist theory. Ignores sense of duty, too much work to predict or know how far to calculate. Thanos. Overall workable
Define
Rule Utilitarianism
Ethics
Ought to adopt moral rules. Not all cases require moral calculus. But requires everything to be measured on single scale. Ignores unjust distribution of good consequences. Also workable.
Define
Social Contract Theory
Ethics
Everyone agrees to the establishment of a set of moral rules to govern relationships, and a government that will enforce the rules. Workable theory
Define
Virtue Ethics
Ethics
A right action is an action that a virtuous person, acting in character, would do in the same circumstances. Hard to hold people responsible bc personal relationships impact. Weak but workable
List
Workable Ethical theories include:
Kantianism
Act and Rule Utilitarianism
Social Contract Theory
Virtue Ethics
List
4 Important functions of Information security
- Protects org’s ability to function
- Protect data and info org collects and uses
- Enable safe operation of applications run on org’s systems
- Safeguard org’s technology assets
Define
Threat
A potential risk to an asset’s loss of value
Define
Attack
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it
Define
Exploit
A technique used to compromise a system
List
Two watchdog organizations that investigate software abuse
Software and Information Industry Association (SIIA)
Business Software Alliance (BSA)
Define
Cracker
“Cracks” or removes software protection designed to prevent unauthorized duplication
Define
Phreaker
Hacks the public telephone system to make free calls or disrupt services
List
Different password attacks
Cracking
Brute Force
Dictionary
Rainbow tables
Social Engineering
Define
Virus
Consists of code segments that attach to existing program and take control of access to the target computer
Define
Worms
Replicate themselves until they completely fill availabel resources such as memory and hard drive space.
Define
Trojan horses
Malware disguised as helpful, interesting, or necessary pieces of software
Define
Polymorphic Threat
Actually evolves ot evade detection
Define
Pharming
Attacks a browsers address bar to redirect users to an illegitimate site