security reversed Flashcards

1
Q

the presence of media and procedures that allow a transaction to be traced through all stages of information processing, beginning with its appearance on a source document and ending with its transformation into information in a final output document

A

audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

files that have been copied and stored via a backup process to protect against damage or loss of the original files

A

backup files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices int he accomplishment of business tasks and decision making

A

business ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

criminal actions accomplished through the use of computer systems, especially with the intent to defraud, destroy, or make unauthorized use of computer system resources

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

using computers to screen and match data about individual characteristics provided by a variety of computer-based information systems and databases to identify individuals for business, government, or other purposes

A

computer matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

using computers to monitor the behavior and productivity of workers on the job and in the workplace

A

computer monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

program code that copies its destructive program routines into the computer systems of anyone who accesses computer systems that have used the program, or anyone who uses copies of data or programs taken from such computers. this spreads the destruction of data and programs among many computer users. technically, a virus will not run unaided by must be inserted into another program, whereas a worm is a distinct program that can run unaided

A

computer virus or worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

methods for ensuring that an organization recovers from natural and human-caused disasters that have affected its computer-based operations

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a malicious attack on a computer system by using a wide distribution of computers to simultaneously and continuously send requests to a single computer or website thus making legitimate requests almost impossible to accommodate

A

distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a form of decentralization of information processing made possible by a network of computers dispersed throughout an organization. processing of user applications is accomplished by several computers interconnected by a telecommunications network, rather than relying on one large centralized computer facility or on the decentralized operation of several independent computers

A

distributed processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

to scramble dta or convert them, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients. similar to enciphering

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the science and technology emphasizing the safety, comfort, and ease of use of human-operated machines such as computers. the goal of ergonomics is to produce systems that are user-friendly: safe, comfortable, and easy to use. ergonomics is also called human factors engineering

A

ergonomics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computers, communications processors, and software that protect computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other networks

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1) obsessive use of a computer

2) the unauthorized access and use of computer systems

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protecting the accuracy, integrity, and safety of the processes and resources of an inter-networked e-business enterprise against computer crime, accidental or malicious destruction, and natural disasters, using security measures such as encryption, firewalls, antivirus software, fault tolerant computers, and security monitors

A

security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

unauthorized copying of software

A

software piracy

17
Q

a process in which a single advertiser sends thousands of messages to computer users without their permission. the computer version of junk mail

A

spamming

18
Q

also called adware

A

spyware