Chapter 4 Flashcards
Ethics
The principles and standards that guide our behavior toward other people.
Information Ethics ***
Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
Privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not be observed without your consent.
Confidentiality
The assurance that messages and information are available only to those who are authorized to view them.
What are the 3 tools to prevent information misuse?
1) information management
2) information governance
3) Information compliance
Ethical Computer Use Policy
Contains general principles to guide computer user behavior.
What does the ethical computer user policy ensure?
That all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules.
Information Privacy Policy
Contains general principles regarding information privacy.
Acceptable Use Policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.
Nonrepudiation
A contractual stipulation to ensure that e-business participants do not deny their online actions.
Internet Use Policy (IUP)
Contains general principles to guide the proper use of the internet.
Email Privacy Policy
Details the extent to which email messages may be read by others.
Social Media Policy
Outline the corporate guidelines or principles governing employee online communications.
Information Technology Monitoring
Tracks peoples activities by such measures as number of keystrokes, error rate, and number of transactions processed
Employee Monitoring Policy
Explicitly state how, when and where the company monitors its employees.
Information Security
Is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside the organization.
Downtime
A period of time when a system is unavailable.
Hacker
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
Virus
Software written with malicious intent to annoy or damage information technology.
Worm
Not need to attach to anything to spread and can tunnel themselves into computers.
Identity theft
The forging of someone’s identity for the purpose of fraud.
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email.
Pharming
Reroutes requests for legitimate websites to false websites.
Authentication
A method for confirming users’ identities.
Authorization
The process of giving someone permission to do or have something.
The most secure type of authentication involves 3 characteristics.
1) Something the user knows
2) Something the user has
3) Something that is part of the user.