Exam 2 Flashcards
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
Privacy
The legal protection afforded an expression of an idea, such as a song, book, or video game
Copyright
The assurance that messages and information are available only to those who are authorized to view them
Confidentiality
The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer
Data scraping
The part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence
Rule 41
Policy that contains general principles regarding information privacy
Information privacy policy
When creating an employee monitoring policy, organizations should follow these common stipulations:
1) Be as specific as possible stating when and what will be monitored
2) Always enforce the policy the same for everyone
3) Expressly communicate that the company reserves the right to monitor all employees
What is the electronic defacing of an existing website?
Cybervandalism
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
Social media monitoring
Which of the following is not an example of unplanned downtime?
System upgrade
What is software written with malicious intent to cause annoyance or damage?
Virus
What is click fraud?
The abuse of pay-per- click, pay-per- call, and pay-per- conversation revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
What includes a variety of threats such as viruses, worms, and Trojan horses?
Malicious code
What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks?
Cybersecurity and Infrastructure Security Agency
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
Cyber terrorists
What are the three areas where technology can aid in the defense against information security attacks?
Authentication and authorization, prevention and resistance, detection and response
Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Destructive agents
3 ways to maintain information security that a company should include in their information security policy
1) Require computer users to log off before leaving for lunch
2) Never share user or password info with anyone
3) Change passwords every 30 to 60 days
What is pharming?
Reroutes requests for legitimate websites to false websites. Example, you type in the URL to your bank and pharming could redirect you to a fake site that collects your information. 
Spear phishing
a phishing Expedition in which the emails are carefully designed to target a particular person or organization
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
Vishing (voice phishing)
The use of a false identity to artificially stimulate demand for a product brand or service
Sock puppet marketing
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
Biometrics
What decodes information?
Decryption 
What are the three business functions and MIS infrastructure supports?
Operations, change, and the environment/sustainability
The plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets
An information MIS infrastructure
A person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business
Enterprise architect
A computer dedicated to providing information in response to requests
A server