Test 2 Flashcards
Adware
Software that although purporting to serve some useful function, also allow internet advertisers to display advertisements without consent
Bring your own device policy
Allows employees to use their personal mobile devices and computers to access enterprise data and applications
Click fraud
The abuse of pay per click by repeatedly clicking s link to increase charges or cost for the advertiser
Content filtering
When organizations use software that filters content to prevent accidental transmissions of unauthorized information
Destructive agents
Malicious agents designed by spammers to farm email addresses off websites
Digital rights management
Technological solution that allows publishers to control their digital media to discourage copying and distribution
Ediscovery
Refers to the ability of s company to identify, search, or export digital info in a responding to a litigation
Epolicies
Policies that address information management along with the ethical use of computers and the internet
Fair information practices
General term for a set of standards governing the collection and use of personal date
Information property
An ethical issue that focuses on who owns information and how it can be sold
Insiders
Legitimate users who purposely misuse their access to the environment and cause a business incident
Intellectual property
Intangible creative work that is embodied in physical form and includes copyrights and trademarks
Nonrepudiation
Contractual stipulation to ensure that ebusiness participants do not deny their online actions
Phishing
Fraudulent emails that looks as though they came from a legit business
Pretexting
Form of social engineering where one person likes to obtain confidential data about another individual
Social engineering
Hackers use their social skills to trick people into revealing valuable info
Spyware
A special class of adware that collects data about the user and transmits it over the internet
Workplace MIS monitoring
Tracks people’s activities by such measures as number of key strokes
Certificate authority
A trusted third party that validates users identities by means of digital certificates
Cryptography
The science that studies encryption
Digital certificate
A data file that identifies individuals or organizations online and is comparable to a digital signature
Intrusion deception software
Features full time monitoring tools that search for patterns in network traffickers to identify intruders
Pharming
Reroutes requests for legit websites to false ones
Public key encryption
Uses two keys: a public key that everyone can have and a private key for only the recipient