Test 2 Flashcards
A set of rules specifying the legal and ethical use of a system and the consequence of non compliance
Acceptable use policy
Refers to the issues involving both the users and the organizations responsibilities and liabilities
Accountability
A method for binding all the parties to a contract
Nonrepudiation
An unsolicited email sent for advertising purposes
Spam
Small text files with unique ID tags that are embedded in a wb browser and saved on the users hard drive.
Cookies
Generated by the web server software to record a users actions on a web site
Log Files
A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for creations of the mind. Developed by people or businesses
Intellectual property
Information technology and internet have created what? Due to computers not being affordable for many people.
Digital divide
Networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so they can share skills and costs and have access to each other’s markets.
Virtual organizations
A software that secretly gathers information about users while they browse the web.
Spyware
A form of spyware that collects information about the user (without the users consent) to determine which advertisements to display in the users web browser.
Adware
Sending fraudulent emails that seem to come from a legitimate source such as a bank or university.
Phishing
Monitor and record keystrokes and can be software or hardware devices
Keystroke loggers
An attempt to gain access to a network by posing as an authorized user in order to find sensitive information such as passwords and credit card info.
Spoofing
Directing internet users to fraudulent websites with the intention of stealing their personal information.
Pharming.
The unauthorized use of computer data for personal gain.
Computer fraud.
A system must prevent disclosing information to anyone who is not an authorized user. This is called what?
Confidentiality
Systems ensure availability in the event of a system failure by using a combination of hardware and software
Fault-tolerant
This backup power unit continues to provide electrical power in the even of blackouts and other power interruptions.
Uninterruptible power supply (UPS)
A collection of disk drives used to store data in multiple places. If one drive fails in this system data stored on it can be reconstructed from data stored on remaining drives.
Redundant array of independent disks (RAID)
Use two disks containing the same data and can be a suitable RAID system for a small organization.
Mirror Disks
Consists of self propagating program code that is triggered by a specified time or event.
Virus
Travels from computer to computer in a network but it does not usually erase. They are independent programs that can spread themselves without having to be attached to a host program.
Worm
A type of Trojan program used to release a virus, work or other destructive code.
Logic bomb