Test 2 Flashcards

1
Q

Adware

A

Software that although purporting to serve some useful function, also allow internet advertisers to display advertisements without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bring your own device policy

A

Allows employees to use their personal mobile devices and computers to access enterprise data and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Click fraud

A

The abuse of pay per click by repeatedly clicking s link to increase charges or cost for the advertiser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Content filtering

A

When organizations use software that filters content to prevent accidental transmissions of unauthorized information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Destructive agents

A

Malicious agents designed by spammers to farm email addresses off websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital rights management

A

Technological solution that allows publishers to control their digital media to discourage copying and distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ediscovery

A

Refers to the ability of s company to identify, search, or export digital info in a responding to a litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Epolicies

A

Policies that address information management along with the ethical use of computers and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fair information practices

A

General term for a set of standards governing the collection and use of personal date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information property

A

An ethical issue that focuses on who owns information and how it can be sold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Insiders

A

Legitimate users who purposely misuse their access to the environment and cause a business incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intellectual property

A

Intangible creative work that is embodied in physical form and includes copyrights and trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nonrepudiation

A

Contractual stipulation to ensure that ebusiness participants do not deny their online actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

Fraudulent emails that looks as though they came from a legit business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pretexting

A

Form of social engineering where one person likes to obtain confidential data about another individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

Hackers use their social skills to trick people into revealing valuable info

17
Q

Spyware

A

A special class of adware that collects data about the user and transmits it over the internet

18
Q

Workplace MIS monitoring

A

Tracks people’s activities by such measures as number of key strokes

19
Q

Certificate authority

A

A trusted third party that validates users identities by means of digital certificates

20
Q

Cryptography

A

The science that studies encryption

21
Q

Digital certificate

A

A data file that identifies individuals or organizations online and is comparable to a digital signature

22
Q

Intrusion deception software

A

Features full time monitoring tools that search for patterns in network traffickers to identify intruders

23
Q

Pharming

A

Reroutes requests for legit websites to false ones

24
Q

Public key encryption

A

Uses two keys: a public key that everyone can have and a private key for only the recipient

25
Script kiddies
Find a king codes on the interment and click and point their way into systems to cause damage or spread viruses
26
Smart card
A device containing embedded technologies that can store small amounts of software to perform some limited processing
27
Tokens
Small electronic defines that change users passwords automatically
28
Three characteristics of organization information
Levels Formats Granularities
29
Four primary traits of the value of information
Your Timeliness Quality Governance