Capstone Exam Flashcards
Still adding information from the study materials provided
Define
Ethical Relativism
Ethics
No universal standards of right and wrong.
Define
Subjective Relativism
Ethics
Each person decides right and wrong for themselves. Allows rationalizing. Not workable
Define
Cultural Relativism
Ethics
Depends on society’s moral guidelines. Arrogant for one society to judge another. Not workable
Define
Divine Command Theory
Ethics
Follow Bible, bad is against God’s will. Not workable in secular society.
Define
Ethical Egoism
Ethics
Everyone focus on own self interest. Take a guess if its workable
Define
Kantianism
Ethics
People’s actions ought to be guided by universal moral laws, which must be based on reason. Only thing that doesn’t need qualification is good will. Dutifullness. Sometimes can’t resolve between two perfect duties. Weak, but workable.
Define
Act Utilitarianism
Ethics
Good if benefits exceeds harm, bad if reverse. Greatest happiness principle. Consequentialist theory. Ignores sense of duty, too much work to predict or know how far to calculate. Thanos. Overall workable
Define
Rule Utilitarianism
Ethics
Ought to adopt moral rules. Not all cases require moral calculus. But requires everything to be measured on single scale. Ignores unjust distribution of good consequences. Also workable.
Define
Social Contract Theory
Ethics
Everyone agrees to the establishment of a set of moral rules to govern relationships, and a government that will enforce the rules. Workable theory
Define
Virtue Ethics
Ethics
A right action is an action that a virtuous person, acting in character, would do in the same circumstances. Hard to hold people responsible bc personal relationships impact. Weak but workable
List
Workable Ethical theories include:
Kantianism
Act and Rule Utilitarianism
Social Contract Theory
Virtue Ethics
List
4 Important functions of Information security
- Protects org’s ability to function
- Protect data and info org collects and uses
- Enable safe operation of applications run on org’s systems
- Safeguard org’s technology assets
Define
Threat
A potential risk to an asset’s loss of value
Define
Attack
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it
Define
Exploit
A technique used to compromise a system