Chapter 13 Flashcards
Ensuring the accuracy, integrity, and safety of
business/IT activities and resources.
Security management
Control totals, error signals, backup files, and
security codes are examples.
Information system
controls
Software that can control access and use of a computer system.
System security monitor
A computer system can continue to operate even after a major system failure if it has this capability.
Fault tolerant
A computer system that serves as a filter for access to and from other networks by a company’s networked computers
Firewall
Laws and regulations focused on issues related
to the Internet and other forms of networked
communications
Cyber law
The presence of documentation that allows a
transaction to be traced through all stages of
information processing.
Audit traiL
Using your voice or fingerprints to identify yourself electronically.
Biometric security
A plan to continue IS operations during an
emergency.
Disaster recovery
Scrambling data during its transmission.
Encryption
Ethical choices may result from decision-making
processes, cultural values, or behavioral stages.
Ethical foundations
Managers must confront numerous ethical
questions in their businesses.
Business ethics
Sending unsolicited e-mail indiscriminately.
Spamming
Software that can infect a machine and transmit
private information back to its owner.
Spyware/Adware
Two different perspectives on the use of private
information
Opt-in/Opt-out