Chapter 4: Ethics And Information Security Flashcards
Ethics
The principles and standards that guide our behavior toward other people
Information Ethics
Govern the ethical and moral issues arising from the development and use of information technologies
Privacy
The right to be left alone when you want to be, to have control over your own personnel possessions, and not to be observed without your consent
Confidentiality
He assurance that messages and information are available only to those who are authorized to view them
Ethical Computer Use Policy
Contains general principles to guide computer user behavior
Information Privacy Policy
Contains general principles regarding information privacy
Acceptable Use Policy
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Non repudiation
A contractual stipulation to ensure that ebusiness participants do not deny their online actions
Internet Use Policy
Contains general principles to guide the proper use of the Internet
Email Privacy Policy
Details the extent to which email messages may be read by others
Spam
Unsolicited mail
Anti Spam policy
Simply states that email users will not send unsolicited emails
Social Media policy
Outlines the corporate guidelines or principles governing employee online communications
Information Technology Monitoring
Tracks people’s activity
Employee Monitoring Policy
Explicitly state how and where the company monitors its employees
Information Security
The protection of information from accidental or intentional misuse by persons inside or outside an organization
Downtime
Refers to a period of time when a system is unavailable
Hacker
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
Virus
Software written with malicious intent to cause annoyance or damage
Identity Theft
The forging of someone’s identity for the purpose of fraud
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email
Pharming
Reroutes requests for legitimate websites to false websites
Authentication
A method for confirming users identities
Authorization
The process of giving someone permission to do or have something
Tokens
Small electronic devices that change user passwords automatically
Smart Card
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
Biometrics
The identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice,, or handwriting
Content Filtering
Prevents emails from containing sensitive information from transmitting and stops spam and viruses from spreading
Firewall
Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Intrusion Detection Software
Features full time monitoring tools that search for patterns in network traffic to identify intruders