Chapter 4: Ethics + information Security Flashcards

1
Q

Information ethics

A

Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy

A

The right to be left alone when you want to be, not to have control over your own personal possessions, and not to be observed without your consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

The assurance that messages and information are available only to those who are authorized to view them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business issues related to information ethics

A

Intellectual property
Copyright
Pirated software
Counterfeit software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tools to prevent information misuse

A

Information management
Information governance
Information compliance
eDiscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ethical computer use policy

A

Contains general principles to guide computer user behavior
- ensures all users are informed of the rules and by agreeing to use the system on that basis, consent to abide by the rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email privacy policy

A

Details the extent to which email messages may be read by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anti-spam policy

A

Simply states that email users will not send unsolicited emails or spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social media policy

A

Outlines the corporate guidelines or principles governing employee online communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Workplace monitoring policy

A

Information technology monitoring

Employee monitoring policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information technology monitoring

A

Tracks peoples activities by such measures as number of keystrokes, error rate, and number of transactions processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Employee monitoring policy

A

Explicitly state how, when, and where the company monitors it’s employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Organizational information is

A

Intellectual capital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information security

A

The protection of information from accidental or intentional misuse by persons inside or outside an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Downtime

A

Refers to a period of time when a system is unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacker

A

Experts in technology who use their knowledge to break into computers and networks, either for profit or motivated by the challenge

  • black hat hacker
  • cracker
  • cyberterrorist
  • hactivist
  • script kiddies or script bunnies
  • white hat hacker
17
Q

Virus

A

Software written with malicious intent to cause annoyance or damage

18
Q

Biggest issue surrounding information security is

A

Not technical but people issue.

  • insiders
  • social engineers
  • dumpster diving
19
Q

First line of defense

A

People

20
Q

Second line of defense

A

Technology

21
Q

Identity theft

A

The forging of someone’s identity for the purpose of fraud

22
Q

Phishing

A

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email

23
Q

Pharming

A

Re routes requests for legitimate websites to false websites

24
Q

Authentication

A

A method for confirming users identities

25
Q

Authorization

A

The process of giving someone permission to do or have something

26
Q

Content filtering

A

Prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading

27
Q

Encryption

A

Scrambles information into an alternative form that requires a key or password to decrypt

28
Q

Firewall

A

Hardware and or software that guards a private network by analyzing the information leaving and entering the network

29
Q

Data prevention and resistance

A

Content filtering
Encryption
Firewall

30
Q

Intrusion detection software

A

Features full time monitoring tools that search for patterns in network traffic to identify intruders

31
Q

Ethics

A

The principle and standards that guide our behavior towards other people