Chapter 4 Ethics and Business Security Flashcards
ethics
principles that guide our behavior toward other people
data scraping
extracting large amounts of data from a website and saving it to a computer or spreadsheet
spoofing
forging of return addresses on an email so the message appears to come from someone other than the true sender. Not a virus, rather a method of virus delivery
malicious code
includes viruses, worms, and trojan horses
packet tampering
denial of service
ransomware
form of malicious software that infects your computer and asks for money.
information security
protection of information from accidental or intentional misuse by people inside or outside the organization
what are the common forms of viruses
malware, botnets, worm, adware, spyware, ransomware, scareware
worm
spreads itself not only from file to file but also from computer to computer
hacker
experts in tech who use their knowledge to break into computers and networks either for profit or because they are motivated by the challenge
network behavior analysis
gathers information on the compuer network traffic patterns to identify odd behavior
cyberattacks
malicious attempts to access or damage a computer system
cyber security
umbrella term that involves prevention, detection, and response to cyberattacks that impact individuals and organziations
multifactor authentication
requires more than 2 means of authentication