OMIS MIDTERM WEEK 3 Flashcards

1
Q

What are Ethics?

A

The principles and standards that guide our behavior toward other people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Information ethics?

A

Governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 categories of Ethical issues?

A
  • Privacy issues
  • Accuracy issues
  • Property issues
  • Accessibility issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Privacy?

A

Privacy – The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Confidentiality?

A

The assurance that messages and information are available only to those who are authorized to view them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Ethical computer use policy?

A

Contains general principles to guide computer user behavior

The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Information privacy policy?

A

Contains general principles regarding information privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Acceptable use policy (AUP)?

A

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Nonrepudiation?

A

A contractual stipulation to ensure that ebusiness participants do not deny their online actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Internet use policy?

A

Contains general principles to guide the proper use of the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Email privacy policy?

A

Details the extent to which email messages may be read by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Spam?

A

Unsolicited email

Anti-spam policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Anti-spam policy?

A

Simply states that email users will not send unsolicited emails (or spam)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Social media policy?

A

Outlines the corporate guidelines or principles governing employee online communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Information technology monitoring?

A

Tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Employee monitoring policy?

A

Explicitly state how, when, and where the company monitors its employees

17
Q

What is Information security?

A

The protection of information from accidental or intentional misuse by persons inside or outside an organization

18
Q

What is Downtime?

A

Refers to a period of time when a system is unavailable

19
Q

What is Authentication?

A

A method for confirming users’ identities

20
Q

What is Authorization?

A

The process of giving someone permission to do or have something
The most secure type of authentication involves
Something the user knows
Something the user has
Something that is part of the user

21
Q

What are Tokens?

A

Small electronic devices that change user passwords automatically

22
Q

What is a Smart card?

A

A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

23
Q

What are Biometrics?

A

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

24
Q

What is Privilege escalation?

A

A network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications

  • Vertical privilege escalation
  • Horizontal privilege escalation
25
Q

What is Personally identifiable information (PII)?

A

Any data that could potentially identify a specific individual. The two types of PII include sensitive PII and nonsensitive PII.

26
Q

What is Nonsensitive PII?

A

Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.

Ex: includes information that does not harm an individual such as an address.

27
Q

What is Sensitive PII?

A

Information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm.

Ex: biometric information, financial information, medical information, and unique identifiers such as passport or Social Security numbers.

28
Q

What is a Firewall?

A

Hardware and/or software that guards a private network by analyzing the information leaving and entering the network

29
Q

What is Intrusion detection software?

A

Features full-time monitoring tools that search for patterns in network traffic to identify intruders

30
Q

What is Vertical privilege escalation?

A

Attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data.

Ex: an attacker might log on to a network by using a guest account and then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges.

31
Q

What is Horizontal privilege escalation?

A

Attackers grant themselves the same access levels they already have but assume the identity of another user.

Ex: someone gaining access to another person’s online banking account would constitute horizontal privilege escalation.