Chapter 9 Flashcards
A good hacker who focuses on securing and protecting IT systems is called a:
White-hat hacker
A computer hacker whose activity is aimed at promoting a social or political cause is called a:
Hacktivist
The ethical and moral issues arising from the development and use of info systems is called:
Information ethics
A program that records keystrokes and mouse clicks is called a:
Key logger
A device that captures keystrokes on their journey from the keyboard to the motherboard is called a:
Hardware key logger
A file deposited on a hard drive by a website containing info about customers and their web activities is called a:
Cookie
A program hidden in free downloadable software which tracks online movements, mines the info stores on a computer, etc, is called:
Spyware
What are some of the negative effects of employee monitoring?
- Lower job satisfaction
- Rise in employee absenteeism
- Lack of trust between employee and employer
What are some challenges of information privacy?
- People release info about themselves (credit card purchases, magazine subscriptions)
- Data storage costs are declining (cheap to keep databases on people)
- Info processing is becoming faster
- More accurate profiles of people are created (advances in data analysis techniques)
- Advances in networking
What prohibits an organization from collecting personal info unless the user agrees to it?
Opt-in model
What permits the collection of personal info until the consumer requests that it stops?
Opt-out model
The Personal Information Protection and Electronic Documents Act is called:
PIPEDA
What are PIPEDA’s 10 guiding principles?
1) Accountability (organization is responsible for personal info)
2) Identifying purposes (purpose for which person info is collected must be identified)
3) Consent (consent of the individual is required)
4) Limiting collection (collection of info is limited to what is necessary)
5) Limiting use, disclosure, and retention (personal info cannot be used for any purpose other than what it was identified for)
6) Accuracy (person info must be accurate)
7) Safeguards (personal info shall be protected)
8) Openness (organization should make its policies and practices available)
9) Individual access ( Person should be given access to the information)
10) Challenging compliance (person should be able to address a challenge)
What identifies the rules required to maintain information security?
An information security policy
What details how an organization will implement the information security policies?
An information security plan