Chapter 13 Flashcards
Ensuring the accuracy, integrity, and safety of
business/IT activities and resources.
Security management
Control totals, error signals, backup files, and
security codes are examples.
Information system
controls
Software that can control access and use of a computer system.
System security monitor
A computer system can continue to operate even after a major system failure if it has this capability.
Fault tolerant
A computer system that serves as a filter for access to and from other networks by a company’s networked computers
Firewall
Laws and regulations focused on issues related
to the Internet and other forms of networked
communications
Cyber law
The presence of documentation that allows a
transaction to be traced through all stages of
information processing.
Audit traiL
Using your voice or fingerprints to identify yourself electronically.
Biometric security
A plan to continue IS operations during an
emergency.
Disaster recovery
Scrambling data during its transmission.
Encryption
Ethical choices may result from decision-making
processes, cultural values, or behavioral stages.
Ethical foundations
Managers must confront numerous ethical
questions in their businesses.
Business ethics
Sending unsolicited e-mail indiscriminately.
Spamming
Software that can infect a machine and transmit
private information back to its owner.
Spyware/Adware
Two different perspectives on the use of private
information
Opt-in/Opt-out
Using computers to identify individuals that fit a
certain profile.
Computer matchinG
Using computers to monitor the activities of
workers.
Computer monitoring
Overwhelming a Web site with requests for service
from captive computers.
Distributed denial of service
(DDOS
Using computers and networks to steal money,
services, software, or data.
Computer crime
Using company computers to access the Internet
during work hours for personal business.
. Unauthorized use
Unauthorized copying of software.
Software piracy
. Unauthorized copying of copyrighted material.
Intellectual property
theft
Electronic breaking and entering into a computer
system
. Hacking
A program that makes copies of itself and destroys
data and programs.
Computer virus
Finds and eliminates computer viruses.
Antivirus software
Sending extremely critical, derogatory, and vulgar
e-mail messages
Flaming
Designing computer hardware, software, and
workstations that are safe, comfortable, and easy
to use.
. Ergonomics
Applications of information technology that have
beneficial effects for society at large.
Societal solutionS
Duplicate files of programs or data that are
periodically copied and stored elsewhere in
case the original is damaged and needs to be
restored.
Backup files
A piece of data, known only to an authorized user,
that is used to gain access to a system
Passwords