Chapter 4: Ethics and Information Security - MIS Business Concerns Flashcards

1
Q

What is information ethics?

A

Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is digital trust?

A

The measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ediscovery (electronic discovery)?

A

The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which act was passed to protect minors from accessing inappropriate material on the Internet?

A

Child Online Protection Act COPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Epolicies?

A

Policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 6 Epolicies.

A
  1. Ethical computer use policy
  2. Information privacy policy
  3. Acceptable use policy
  4. Email privacy policy
  5. Social media policy
  6. Workplace monitoring policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ethical computer use policy?

A

General principles to guide computer use behaviour (such as refraining from playing games during working hours)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is click-fraud?

A

Abuse of pay-per-click, pay-per-call, etc revenue models by repeatedly clicking a link to increase charges or costs for the advertiser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is competitive click-fraud?

A

Done by a competitor or disgruntled employee to increase advertising costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which epolicy is the most important?

A

Ethical computer use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is data/web scraping?

A

Process of extracting large amounts of data from a website and saving it to a spreadsheet or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the GDPR?

A

General Data Protection Regulation. The world’s strongest fair information practices in Europe. It is a legal framework that sets guidelines for the collection and processing of personal info of individuals within the EU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an acceptable use policy?

A

Requires a user to agree to follow it to be provided access to corp information, information systems, and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is typosquatting?

A

Registering purposely misspelled variations of well-known domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an email privacy policy?

A

The extent to which email messages may be read by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is teergrubing?

A

Anti-spamming approach by which the receiving computer launches a return attack against a spammer, sending emails back to the computer that originated the spam.

17
Q

What is the right to be forgotten?

A

European Commission’s proposal to create a sweeping individual privacy right allowing individuals to request to have all content that violates their privacy removed.

18
Q

What is social media monitoring?

A

Process of monitoring and responding to what is said about a company, typically falls to the social media manager.

19
Q

What is workplace MIS monitoring?

A

Tracks peoples activities by measures as number of keystrokes, error rate, number of transactions processed.

20
Q

What is an employee monitoring policy?

A

States how, when, and where the company monitors its employees.

21
Q

What are the 4 categories that make up the cost of downtime?

A

Financial performance, revenue, damaged reputation, other expenses.

22
Q

What is the primary tool an organization can use to combat threats associated with downtime?

A

Information security

23
Q

What are white-hat hackers?

A

Work at the request of the system owners to find system vulnerabilities and plug holes.

24
Q

What are script kiddies/bunnies?

A

Find hacking code on the Internet and click-and-point their way into systems to cause damage and spread viruses

25
Q

What are Crackers?

A

Hackers with criminal intent

26
Q

What are Hactivists?

A

Have philosophical and political reasons for hacking

27
Q

What is a bug bounty program?

A

Crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.

28
Q

What are botnets?

A

Malware that causes a collection of connected devices to be controlled by a hacker.

29
Q

What is a worm and how is it different than a virus?

A

Worms spread themselves from file to file and computer to computer. Viruses must attach to something to spread, worms do not need to attach to anything.