Chapter 4: Ethics And Information Security Flashcards

1
Q

Ethics

A

The principles and standards that guide our behavior toward other people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Ethics

A

Govern the ethical and moral issues arising from the development and use of information technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy

A

The right to be left alone when you want to be, to have control over your own personnel possessions, and not to be observed without your consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

He assurance that messages and information are available only to those who are authorized to view them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethical Computer Use Policy

A

Contains general principles to guide computer user behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Privacy Policy

A

Contains general principles regarding information privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acceptable Use Policy

A

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non repudiation

A

A contractual stipulation to ensure that ebusiness participants do not deny their online actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet Use Policy

A

Contains general principles to guide the proper use of the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email Privacy Policy

A

Details the extent to which email messages may be read by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spam

A

Unsolicited mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anti Spam policy

A

Simply states that email users will not send unsolicited emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Media policy

A

Outlines the corporate guidelines or principles governing employee online communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Technology Monitoring

A

Tracks people’s activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employee Monitoring Policy

A

Explicitly state how and where the company monitors its employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Security

A

The protection of information from accidental or intentional misuse by persons inside or outside an organization

17
Q

Downtime

A

Refers to a period of time when a system is unavailable

18
Q

Hacker

A

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

19
Q

Virus

A

Software written with malicious intent to cause annoyance or damage

20
Q

Identity Theft

A

The forging of someone’s identity for the purpose of fraud

21
Q

Phishing

A

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email

22
Q

Pharming

A

Reroutes requests for legitimate websites to false websites

23
Q

Authentication

A

A method for confirming users identities

24
Q

Authorization

A

The process of giving someone permission to do or have something

25
Q

Tokens

A

Small electronic devices that change user passwords automatically

26
Q

Smart Card

A

A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

27
Q

Biometrics

A

The identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice,, or handwriting

28
Q

Content Filtering

A

Prevents emails from containing sensitive information from transmitting and stops spam and viruses from spreading

29
Q

Firewall

A

Hardware and/or software that guards a private network by analyzing the information leaving and entering the network

30
Q

Intrusion Detection Software

A

Features full time monitoring tools that search for patterns in network traffic to identify intruders