Chapter 4: Ethics And Information Security Flashcards
Ethics
The principles and standards that guide our behavior toward other people
Information Ethics
Govern the ethical and moral issues arising from the development and use of information technologies
Privacy
The right to be left alone when you want to be, to have control over your own personnel possessions, and not to be observed without your consent
Confidentiality
He assurance that messages and information are available only to those who are authorized to view them
Ethical Computer Use Policy
Contains general principles to guide computer user behavior
Information Privacy Policy
Contains general principles regarding information privacy
Acceptable Use Policy
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Non repudiation
A contractual stipulation to ensure that ebusiness participants do not deny their online actions
Internet Use Policy
Contains general principles to guide the proper use of the Internet
Email Privacy Policy
Details the extent to which email messages may be read by others
Spam
Unsolicited mail
Anti Spam policy
Simply states that email users will not send unsolicited emails
Social Media policy
Outlines the corporate guidelines or principles governing employee online communications
Information Technology Monitoring
Tracks people’s activity
Employee Monitoring Policy
Explicitly state how and where the company monitors its employees
Information Security
The protection of information from accidental or intentional misuse by persons inside or outside an organization
Downtime
Refers to a period of time when a system is unavailable
Hacker
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
Virus
Software written with malicious intent to cause annoyance or damage
Identity Theft
The forging of someone’s identity for the purpose of fraud
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email
Pharming
Reroutes requests for legitimate websites to false websites
Authentication
A method for confirming users identities
Authorization
The process of giving someone permission to do or have something