D333(C961): Ethics in Technology Flashcards

1
Q

Bathsheba Syndrome

A

The moral corruption of people in power which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Code Of Ethics

A

A statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate Compliance Officer Or Corporate Ethics Officer

A

A senior-level manager who provides an organization with vision and leadership in the area of business conduct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Corporate Social Responsibility (CSR)

A

The concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders consumers employees community environment and suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethics

A

A code of behavior that is defined by the group to which an individual belongs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

Adherence to a personal code of principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Law

A

A system of rules that govern what we can and cannot do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Morals

A

The personal principles upon which an individual bases his or her decisions about what is right and what is wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Problem Statement

A

A clear concise description of the issue that needs to be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Audit

A

A process whereby an organization reviews how well it is meeting its ethical and social responsibility goals and communicates its new goals for the upcoming year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Piracy

A

A form of copyright infringement that involves making copies of software or enabling others to access software to which they are not entitled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Supply Chain Sustainability

A

A component of corporate social responsibility (CSR) that focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stakeholder

A

Someone who stands to gain or lose depending on how a particular situation is resolved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vice

A

A habit of unacceptable behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtue

A

A habit that inclines people to do what is acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Persistent Threat (APT)

A

A network attack in which an intruder gains access to a network and stays there - undetected - with the intention of stealing data over a long period of time (weeks or even months).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Antivirus Software

A

Software that scans for a specific sequence of bytes known as a virus signature that indicates the presence of a specific virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Blended Threat

A

A sophisticated threat that combines the features of a virus worm Trojan horse and other malicious code into a single payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Botnet

A

A large group of computers which are controlled from one or more remote locations by hackers without the knowledge or consent of their owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bring Your Own Device (BYOD)

A

A business policy that permits - and in some cases encourages - employees to use their own mobile devices (smartphones tablets or laptops) to access company resources and applications including email corporate databases the corporate intranet and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Business Continuity Plan

A

A risk-based strategy that includes an occupant emergency evacuation plan a continuity of operations plan and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Captcha (Completely Automated Public Turing Test To Tell Computers And Humans Apart)

A

Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CIA Security Triad

A

Refers to confidentiality integrity and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Computer Forensics

A

A discipline that combines elements of law and computer science to identify collect examine and preserve data from computer systems networks and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Controlling The Assault Of Non-Solicited Pornography And Marketing (CAN-SPAM) Act

A

A law that specifies that it is legal to spam provided the messages meet a few basic requirements: spammers cannot disguise their identity by using a false return address the email must include a label specifying that it is an ad or a solicitation and the email must include a way for recipients to indicate that they do not want future mass mailings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cost Per Thousand Impressions (CPM)

A

One of the two common methods of charging for paid media in which ads are billed at a flat rate per 1 000 impressions which is a measure of the number of times an ad is displayed whether it was actually clicked on or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cost Per Click (CPC)

A

One of the two common methods of charging for paid media in which ads are paid for only when someone actually clicks on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cyberabuse

A

Any form of mistreatment or lack of care both physical and mental using an electronic communications device that causes harm and distress to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cyberespionage

A

The deployment of malware that secretly steals data in the computer systems of organizations such as government agencies military contractors political organizations and manufacturing firms.

30
Q

Cyberharassment

A

A form of cyberabuse in which the abusive behavior which involves the use of an electronic communications device is degrading humiliating hurtful insulting intimidating malicious or otherwise offensive to an individual or group of individuals causing substantial emotional distress.

31
Q

Cyberstalking

A

Threatening behavior or unwanted advances directed at an adult using the internet or other forms of online and electronic communications; the adult version of cyberbullying.

32
Q

Cyberterrorism

A

The intimidation of the government or civilian population by using information technology to disable critical national infrastructure (e.g. energy transportation financial law enforcement and emergency response) to achieve political religious or ideological goals.

33
Q

Department Of Homeland Security (DHS)
Employees
Budget
Goal

A

A large federal agency with more than 240 000 employees and a budget of almost $65 billion whose goal is to provide for a “safer more secure America which is resilient against terrorism and other potential threats.”

34
Q

Disaster Recovery Plan

A

A documented process for recovering an organization’s business information system assets—including hardware software data networks and facilities—in the event of a disaster.

35
Q

Distributed Denial-Of-Service (DDOS) Attack

A

An attack in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks.

36
Q

Earned Media

A

Media exposure an organization gets through press and social media mentions positive online ratings reviews tweets and retweets reposts (or “shares”) recommendations and so on.

37
Q

Encryption

A

The process of scrambling messages or data in such a way that only authorized parties can read it.

38
Q

Encryption Key

A

A value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext) which is unreadable by those without the encryption key needed to decipher it.

39
Q

Exploit

A

An attack on an information system that takes advantage of a particular system vulnerability.

40
Q

Firewall

A

Hardware or software (or a combination of both) that serves as the first line of defense between an organization’s network and the internet; also limits access to the company’s network based on the organization’s internet-usage policy.

41
Q

Intrusion Detection System (IDS)

A

Software or hardware (or both) that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

42
Q

Logic Bomb

A

A type of Trojan horse malware that executes when it is triggered by a specific event or at a predetermined time.

Logic Bomb: A logic bomb is a type of malicious code that is intentionally inserted into a computer system or software program. It remains dormant until a specific condition or trigger is met.

Trojan is a type of malware that disguises itself as legitimate software or files to deceive users into downloading or executing it.

43
Q

Managed Security Service Provider (MSSP)

A

A company that monitors manages and maintains computer and network security for other organizations.

44
Q

Mission-Critical Process

A

Business processes that are more pivotal to continued operations and goal attainment than others.

45
Q

Next-Generation Firewall (NGFW)

A

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

46
Q

Organic Media Marketing

A

A form of marketing that employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization’s blog and social media accounts.

47
Q

Paid Media Marketing

A

A form of marketing that involves paying a third party to broadcast an organization’s display ads or sponsored messages to social media users.

48
Q

Phishing

A

The act of fraudulently using email to persuade the recipient to reveal personal data.

49
Q

Ransomware

A

Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom or sending photos to the attacker.

50
Q

Reasonable Assurance

A

A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

51
Q

Risk Assessment

A

The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.

52
Q

Rootkit

A

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.

A rootkit is a type of malicious software that is designed to gain privileged access and control over a computer system while remaining hidden from detection. It is often installed by an attacker or malware to maintain unauthorized access, manipulate system functions, and evade security measures.

53
Q

Security Audit

A

An evaluation of whether or not an organization has a well-considered security policy in place and whether or not it is being followed.

54
Q

Security Policy

A

An organization’s security requirements as well as the controls and sanctions needed to meet those requirements.

55
Q

Smishing

A

Another variation of phishing that involves the use of texting.

56
Q

Social Media

A

Web-based communication channels and tools that enable people to interact with each other by creating online communities where they can share information ideas messages and other content including images audio and video.

57
Q

Social Media Marketing

A

A form of marketing that involves the use of social networks to communicate and promote the benefits of products and services.

58
Q

Social Networking Platform

A

Technology that allows the creation of an online community of internet users that enables members to break down barriers created by time distance and cultural differences.

59
Q

Social Shopping Platform

A

A combination of shopping and social networking.

60
Q

Spam

A

The use of email systems to send unsolicited email to large numbers of people.

61
Q

Spear Phishing

A

A variation of phishing in which the phisher sends fraudulent emails to a certain organization’s employees.

62
Q

Transport Layer Security (TLS)

A

A communications protocol or system of rules that ensures privacy between communicating applications and their users on the internet.

63
Q

Trojan Horse

A

A seemingly harmless program in which malicious code is hidden.

64
Q

US-CERT
year and function

A

Established in 2003 to protect the nation’s internet infrastructure against cyberattacks and serves as a clearinghouse for information on new viruses worms and other computer security topics.

It is a division of the Department of Homeland Security (DHS) in the United States. US-CERT serves as the nation’s primary organization for coordinating defense against and responding to cyber incidents.

65
Q

Viral Marketing

A

An approach to advertising that encourages individuals to pass along a marketing message to others thus creating the potential for exponential growth in the message’s exposure and influence.

66
Q

Virus

A

A piece of programming code usually disguised as something else that causes a computer to behave in an unexpected and usually undesirable manner.

67
Q

Virus Signature

A

A specific sequence of bytes that indicates to antivirus software that a specific virus is present.

68
Q

Vishing

A

Similar to smishing except that the victims receive a voicemail message telling them to call a phone number or access a website.

69
Q

Worm

A

A harmful program that resides in the active memory of the computer and duplicates itself.

70
Q

Zero-Day Exploit

A

A cyberattack that takes place before the security community or software developers become aware of and fix a security vulnerability.