Test 2 Flashcards

1
Q

Adware

A

Software that although purporting to serve some useful function, also allow internet advertisers to display advertisements without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bring your own device policy

A

Allows employees to use their personal mobile devices and computers to access enterprise data and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Click fraud

A

The abuse of pay per click by repeatedly clicking s link to increase charges or cost for the advertiser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Content filtering

A

When organizations use software that filters content to prevent accidental transmissions of unauthorized information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Destructive agents

A

Malicious agents designed by spammers to farm email addresses off websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital rights management

A

Technological solution that allows publishers to control their digital media to discourage copying and distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ediscovery

A

Refers to the ability of s company to identify, search, or export digital info in a responding to a litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Epolicies

A

Policies that address information management along with the ethical use of computers and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fair information practices

A

General term for a set of standards governing the collection and use of personal date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information property

A

An ethical issue that focuses on who owns information and how it can be sold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Insiders

A

Legitimate users who purposely misuse their access to the environment and cause a business incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intellectual property

A

Intangible creative work that is embodied in physical form and includes copyrights and trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nonrepudiation

A

Contractual stipulation to ensure that ebusiness participants do not deny their online actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

Fraudulent emails that looks as though they came from a legit business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pretexting

A

Form of social engineering where one person likes to obtain confidential data about another individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

Hackers use their social skills to trick people into revealing valuable info

17
Q

Spyware

A

A special class of adware that collects data about the user and transmits it over the internet

18
Q

Workplace MIS monitoring

A

Tracks people’s activities by such measures as number of key strokes

19
Q

Certificate authority

A

A trusted third party that validates users identities by means of digital certificates

20
Q

Cryptography

A

The science that studies encryption

21
Q

Digital certificate

A

A data file that identifies individuals or organizations online and is comparable to a digital signature

22
Q

Intrusion deception software

A

Features full time monitoring tools that search for patterns in network traffickers to identify intruders

23
Q

Pharming

A

Reroutes requests for legit websites to false ones

24
Q

Public key encryption

A

Uses two keys: a public key that everyone can have and a private key for only the recipient

25
Q

Script kiddies

A

Find a king codes on the interment and click and point their way into systems to cause damage or spread viruses

26
Q

Smart card

A

A device containing embedded technologies that can store small amounts of software to perform some limited processing

27
Q

Tokens

A

Small electronic defines that change users passwords automatically

28
Q

Three characteristics of organization information

A

Levels
Formats
Granularities

29
Q

Four primary traits of the value of information

A

Your
Timeliness
Quality
Governance