MIS Chapter 4 Flashcards
Acceptable Use Policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.
- Not using the service as part of violating any law
- Not attempting to break the security of any computer network or user
- Not Posting commercial messages to groups without prior permission
- Not performing any nonrepudiation
Adware
Is software tha, while purporting to serve some useful functions and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
Advanced Encryption Standard (AES)
Designed by the National Institute of Standards to keep government information secure.
Anti-Spam Policy
Simply states that email users will not send unsolicited emails (or spam).
Anitvirus Software
Scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware.
Authentication
Is a method for confirming users’ indentities.
Authorization
Is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.
Biometrics
Is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Black-hat Hackers
Break into other people’s computer systems and may just look around or may steal and destroy information.
Certificate Authority
Is a trusted third party, such as VeriSign, that validates user identities by means of digital certification.
Child Online Protection Act (COPA)
Was passed to protect minors from accessing inappropriate material on the Internet.
Click-Fraud
Is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Competitive Click-Fraud
Is a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link.
Confidentiality
Is the assurance that messages and information remain available only to those authorized to view them.
Content Filtering
Occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.
Copyright
Is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Counterfeit Software
Is software that is manufactured to look like the real thing and sold as such.
Cracker
Have criminal intent when hacking.
Cryptography
Is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Cyberbullying
Includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
Cybervandalism
Is the electronic defacing of an existing website.
Cyberterrorism
Is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious or ideological goals.
Cyberwar
Is an organized attempt by a country’s military to disrupt or destroy information and communication systems for another country.
Decrypt
To decode information that has been encrypted.
Destructive Agents
Are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Digital Certificate
Is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Digital Rights Management
Is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Downtime
Refers to a period of time when a system is unavailable.
Drive-By Hacking
Is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or send attack instruction without entering the office or organization that owns the network.
Dumpster Diving
Looking through people’s trash to obtain information.
Ediscovery (or Electronic Discovery)
Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Email Privacy Policy
Details the extent to which email messages may be read by others.
- Defines legitimate email users and explains what happens to accounts after a person leaves the organization
- Explains backup procedure so users will know that at some point, even if a message is deleted from their computer, it is still stored by the company
- Describes the legitimate grounds for reading email and the process required before such action is performed
- Discourages sending junk email or spam to anyone who does not want to receive it
- Prohibits attempting to mail bomb a site
- Informs users that the organization has no control over email once it has been transmitted outside the organization
Employee Monitoring Policy
States explicitly how, when, and where the company monitors its employees.
- Be as specific as possible stating when and what (email, IM, Internet, network activity, ext.) will be monitored
- Expressly communicate that the company reserves the right to monitor all employees
- State the consequences of violating the policy
- Always enforce the policy the same for everyone
Encryption
Scrambles information into an alternative form that requires a key or password to decrypt.
Epolicies
Are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
- Ethical Computer Use Policy
- Information Privacy Policy
- Acceptable Use Policy
- Email Privacy Policy
- Social Media Policy
- Workplace Monitoring Policy