Capstone Exam Flashcards

Still adding information from the study materials provided

1
Q

Define

Ethical Relativism

Ethics

A

No universal standards of right and wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define

Subjective Relativism

Ethics

A

Each person decides right and wrong for themselves. Allows rationalizing. Not workable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define

Cultural Relativism

Ethics

A

Depends on society’s moral guidelines. Arrogant for one society to judge another. Not workable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define

Divine Command Theory

Ethics

A

Follow Bible, bad is against God’s will. Not workable in secular society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define

Ethical Egoism

Ethics

A

Everyone focus on own self interest. Take a guess if its workable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define

Kantianism

Ethics

A

People’s actions ought to be guided by universal moral laws, which must be based on reason. Only thing that doesn’t need qualification is good will. Dutifullness. Sometimes can’t resolve between two perfect duties. Weak, but workable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define

Act Utilitarianism

Ethics

A

Good if benefits exceeds harm, bad if reverse. Greatest happiness principle. Consequentialist theory. Ignores sense of duty, too much work to predict or know how far to calculate. Thanos. Overall workable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define

Rule Utilitarianism

Ethics

A

Ought to adopt moral rules. Not all cases require moral calculus. But requires everything to be measured on single scale. Ignores unjust distribution of good consequences. Also workable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define

Social Contract Theory

Ethics

A

Everyone agrees to the establishment of a set of moral rules to govern relationships, and a government that will enforce the rules. Workable theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define

Virtue Ethics

Ethics

A

A right action is an action that a virtuous person, acting in character, would do in the same circumstances. Hard to hold people responsible bc personal relationships impact. Weak but workable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List

Workable Ethical theories include:

A

Kantianism
Act and Rule Utilitarianism
Social Contract Theory
Virtue Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List

4 Important functions of Information security

A
  1. Protects org’s ability to function
  2. Protect data and info org collects and uses
  3. Enable safe operation of applications run on org’s systems
  4. Safeguard org’s technology assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define

Threat

A

A potential risk to an asset’s loss of value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define

Attack

A

An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define

Exploit

A

A technique used to compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List

Two watchdog organizations that investigate software abuse

A

Software and Information Industry Association (SIIA)
Business Software Alliance (BSA)

17
Q

Define

Cracker

A

“Cracks” or removes software protection designed to prevent unauthorized duplication

18
Q

Define

Phreaker

A

Hacks the public telephone system to make free calls or disrupt services

19
Q

List

Different password attacks

A

Cracking
Brute Force
Dictionary
Rainbow tables
Social Engineering

20
Q

Define

Virus

A

Consists of code segments that attach to existing program and take control of access to the target computer

21
Q

Define

Worms

A

Replicate themselves until they completely fill availabel resources such as memory and hard drive space.

22
Q

Define

Trojan horses

A

Malware disguised as helpful, interesting, or necessary pieces of software

23
Q

Define

Polymorphic Threat

A

Actually evolves ot evade detection

24
Q

Define

Pharming

A

Attacks a browsers address bar to redirect users to an illegitimate site

25
Q

List

4 Phases of Goal-based strategic planning

A

Analyze the situation
Set direction
Define strategies
Deploy the Plan

26
Q

List

Strategic Planning Pyramid

Top-down

A

Mission
Vision
Values
Objectives
Goals
Strategies
Initiatives, programs, and projects

27
Q

Define

SWOT analysis

A

Strengths, weaknesses, opportunities, threats

28
Q

List

5 parameters that define a project

A

Scope
Cost
Time
Quality
User Expectations