Final Flashcards
5 FIP principles
Notice/Awareness Choice/Consent Access/Participation Integrity/Security Enforcement
Digital divide
x
Intellectual property, copyright and fair use
Intellectual property: Intangible property of any kind created by individuals or corporations
Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years
Fair use:
Cookies
Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site
Allow Web sites to develop profiles on visitors
Spam
unsolicited e-mail from businesses advertising goods and services
Behavioral targeting
x
Patent trolls
a “non-practicing entity” with no business activities or employees of its own
weaknesses in the patent system without adding value
license patents without producing goods, extract licensing fees from the real innovators
lawsuits associated with patent trolls led to half a trillion dollars of lost wealth to defendants from 1990 through 2010 (Bessen et al. 2011)*
During 2006-2010 the losses were $80 billion a year (Bessen et al.)
In 2010, 2,600 lawsuits were filed by patent trolls
The median defense cost per defendant is $3m for a mid-sized patent case, for large cases is $6m (American Intellectual Property Law Association)
The Sarbanes-Oxley Act
Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally
Malware (virus, worm, Trojan etc.) what they are and how they affect computer systems
Spyware Trojan Virus Worm Rootkit
Phishing
They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.
Identity theft
occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes
9 million Americans have their identities stolen each year (FTC 2011)
Website security - SET and SSL
Secure Electronic Transaction (SET) – a set of security protocols that ensures transactions are legitimate as well as secure
- Helps verify use of a credit card, for example, by sending the transaction to the credit issuer as well as the seller/supplier
- Endorsed by AmEx, MasterCard, Visa, Microsoft
Secure Sockets Layer (SSL) - creates a secure connection between a Web client and server, encrypts the information, and sends the information over the Internet
- Denoted by lock icon on browser or https:// (notice the “s”)
- Ensures secure transactions but does NOT secure legitimacy
Denial of service attacks
x
Three lines of defense
Authentication and authorization - a method for confirming users’ identities and the process of giving someone permission to do or have something
* Passwords
* Tokens
* Biometrics
Security policy and plan
Technology (antivirus, firewall, encryption, etc.)
* Anti-virus software – detects and removes or quarantines computer viruses
* Anti-spyware and anti-adware software
* Spam protection software – identifies and marks and/or deletes Spam
* Anti-phishing software – lets you know when phishing attempts are being made
Web defacing
x