Chapter 9: Privacy, Security and Ethics Flashcards

1
Q

Technology has had a very positive impact on

A

People, but some of the impact could be negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most significant concerns about technology

A

1) Privacy: What are the threats to personal privacy, and how can we protect ourselves?
2) Security: How can access sensitive information be controlled, and how can we secure hardware and software?
3) Ethics: How do the actions of individual users and companies affect society?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy

A

Concerns the collection and use of data about individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accuracy

A

Responsibility of those who collect data and must be secure and correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Property

A

Relates to who owns the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access

A

Responsibility of those who control data and use that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Large organizations compile

A

Information about us daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Big data is

A

Exploding and ever-growing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

90% of the data collected has been

A

Collected over the last 2 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Resellers/Brokers

A

1) Collect and sell personal data
2) Create electronic profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personal information is

A

A marketable commodity, which raises many issues:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Collecting public, but

A

Personally identifying information (e.g Google’s Street View)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spreading information without

A

Personal consent, leading to identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spreading inaccurate information

A

Mistaken identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Freedom of Information Act

A

Entitlement to look at your records held by government agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employee monitoring software

A

Employers can monitor email legally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A proposed law could

A

Prohibit this type of electronic monitoring or at least require the employer to notify the employee first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Illusion of anonymity

A

People are not concerned about privacy when surfing the Internet or when sending email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When browsing the web, critical information is stored on the hard drive in these locations, and these are included.

A

1) History Files
2) Temporary Internet Files
3) Browser cache
4) Cookies
5) Privacy Mode
6) Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

History Files

A

Include locations or addresses of sites you have recently visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Temporary Internet Files/Browser Cache

A

1) Saved files from visited websites
2) Offers quick re-display when you return to the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Small data files that are deposited on your hard disk from

A

Web sites you have visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

First-party cookies

A

Generated only by websites you are visiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Third-party cookies

A

Generated by an advertising company that is affiliated with the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Tracking cookies

A

To keep track of your Internet activities through third party cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Privacy Modes

A

Ensure your browsing activity is not recorded on your hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Recognition Mode is

A

Google Chrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Private Browsing

A

Safari

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Web bugs

A

Invisible images or HTML code hidden within an e-mail message or webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Spyware

A

1) Record and report Internet activities
2) Change the browser to manipulate what you view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Computer monitoring software

A

1) Most invasive and dangerous
2) Keystroke loggers: Record activities and keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Anti-Spyware programs

A

Detect and remove privacy threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Online Identity

A

The information that people voluntarily post and online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Archiving and search features of

A

The Web makes it available indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Major Laws on Privacy

A

1) Gramm-Leach-Bliley Act
2) Health Insurance Portability and Accountability Act (HIPAA)
3) Family Educational Rights and Privacy Act (FERPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

1) Gramm-Leach-Bliley Act

A

Protects personal financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

2) Health Insurance Portability and Accountability Act (HIPAA)

A

Protects medical records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

3) Family Educational Rights and Privacy Act (FERPA)

A

Resists disclosure of educational records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Security

A

Involve protecting individuals or organizations from theft and danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Hackers

A

1) Gain unauthorized access with malicious intent
2) Not all hackers are illegal

41
Q

Cybercrime/Computer Crime

A

A criminal offense that involves a computer and a network
1) Effect over 400 million people annually
2) Costs over $400 billion each year

42
Q

Identity theft

A

Illegal assumption of a person’s identity for economic gain

43
Q

Internet scams

A

Scams over the Internet

44
Q

Data manipulation

A

Unauthorized access of a computer network and copying files to or from the server

45
Q

Ransomware

A

Malicious software that encrypts your computer’s data and ransoms the password to the user

46
Q

DoS, Denial of Service

A

Attempt to slow down or stop a computer system or network by flooding a computer or network with requests for information and data

47
Q

DDoS, Distributed denial of Service

A

Coordinates several computer making repeated requests for service

48
Q

Internet Scams

A

Scams using the Internet

49
Q

Internet scams have created

A

Financial and legal problems for many thousands of people

50
Q

The majority are initiated by

A

A mass mailing to unsuspecting individuals

51
Q

Advance fee loans

A

Guaranteed low-rate available to almost anyone. After the applicant provides personal loan-related information, the loan is granted subject to an “insurance fee payment.”

52
Q

Auction fraud

A

Merchandise is selected, and payment is sent. Merchandise is never delivered

53
Q

Fake Antivirus Software

A

A website or email warns you that you are at risk of being infected by a computer virus and need to download and install the security software they recommend. Ironically, the security software is fake and will install malicious software on your computer

54
Q

Nigerian Scam

A

A classic email scam. The recipient receives an email from a wealthy foreigner in distress who needs your bank account information to safely store their wealth, and for your trouble, you will receive a large amount of money. Of course, once the scammer has your bank account information and your accounts will be drained and they will disappear

55
Q

Social Engineering

A

Practice of manipulating people to divulge private data

56
Q

Social Engineering played a crucial role in

A

1) Identity theft
2) Internet scams
3) Data manipulation

57
Q

Phishing

A

Attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate

58
Q

Malicious Programs or Malware

A

Designed by crackers, computer criminals, to damage or disrupt a computer system

59
Q

Computer Fraud and Abuse Act makes

A

Spreading a virus a federal offense

60
Q

3 most common programs

A

1) Viruses
2) Worms
3) Trojan Horse

61
Q

Viruses

A

Migrate through networks and attach to different programs

62
Q

Worms

A

Fills the computer with self-replicating information

63
Q

Trojan Horse

A

Programs disguised as something else

64
Q

Malicious Hardware

A

Criminals use hardware for crimes

65
Q

The most common are malicious hardware

A

1) Zombies
2) Rogue Wi-Fi Hotspot
3) Infect USB Flash Drives

66
Q

Zombies

A

1) Computers infected by a virus, worm, or Trojan Horse
2) Botnet or Robot Network is a collection of Zombies

67
Q

Rogue Wi-Fi Hotspot

A

1) Imitating legitimate free Wi-Fi
2) Capture data coming through the Rogue Wi-Fi

68
Q

Infect USB Flash Drives

A

1) Left on purpose in hopes for people to pick up and use
2) Have malicious software contained on them

69
Q

Measures to Protect Computer Security

A

Principle measures to ensure computer security

70
Q

Computer Fraud and Abuse Act

A

1) Crime for an unauthorized person to view, copy, or damage data using computers across state lines
2) Prevents use of any government or federally insured financial institution computers

71
Q

Restricting Access

A

1) Password
2) Biometric scanning

72
Q

Dictionary Attack

A

It uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account

73
Q

Biometric scanning

A

1) Fingerprint scanners
2) Iris (eye) scanner
3) Facial recognition

74
Q

Ways to perform and automate important security tasks

A

1) Security suites
2) Firewalls
3) Password managers

75
Q

Security suites

A

Provide a collection of utility programs designed to protect your privacy and security

76
Q

Firewalls

A

Security buffer between a corporation’s provide network and all external networks

77
Q

Password managers

A

Helps to create strong password

78
Q

Encryption: Coding information to make it unreadable, except to

A

Those who have the encryption key or key

79
Q

The key will decrypt the information into

A

A readable format

80
Q

Common uses for encryption

A

1) Email encryption
2) File encryption
3) Website encryption: HTTPS: hypertext transfer protocol secured
4) Virtual private network
5) WPA2 Wifi protected access

81
Q

Wireless network encryption restricts access to

A

Authorized users

82
Q

Anticipating Disaster

A

1) Physical security
2) Data security
3) Disaster recovery plan

83
Q

Physical security protects

A

Hardware

84
Q

Data security protects

A

Software and data from unauthorized tampering or damage

85
Q

A disaster recovery plan describes ways to

A

Continue operating in the event of a disaster

86
Q

Preventing data loss

A

1) Frequent backups
2) Redundant data storage

87
Q

Store-off site in case of

A

Loss of equipment

88
Q

Precautions you as an individual can and should take to make sure that you aren’t the victim of high-tech criminals

A

1) Update software
2) Be careful when browsing
3) Be alert to email scams
4) Use antivirus software
5) Strong passwords

89
Q

Ethics

A

Standards of moral conduct

90
Q

Computer ethics

A

Guidelines for the morally acceptable use of computers
1) Copyright and Digital Rights Management
2) Cyberbullying
3) Plagiarism

91
Q

Copyright

A

1) Gives content creators the right to control the use and distribution of their work
2) Paintings, books, music, films, and video games

92
Q

Software piracy

A

Unauthorized copying and distribution of software

93
Q

Digital rights management (DRM) controls access to

A

Electronic media

94
Q

Digital Millenium Copyright Act protects

A

Against piracy

95
Q

Cyberbullying

A

Use of the Internet to send or post content intended to harm another person

96
Q

Plagiarism

A

Representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas

97
Q

Most forums and comment areas on websites to

A

Allow users to post messages anonymously

98
Q

Future software can

A

Identify you and track your moves through a mall or store