Shared Flashcard Set

Details

Information Systems CH 4
Chapter 4
30
Business
Undergraduate 3
03/09/2010

Additional Business Flashcards

 


 

Cards

Term
Cookies
Definition
small file deposited on a harddrive containing information about the customer and their web activities
Term
Spyware
Definition
Hidden software that tracks online movements
Term
Hardware key jogger
Definition
Captures keystrokes from the keyboard to the motherboard
Term
Intellectual Property
Definition
Intangible creative work that is embodied in physical form
Term
Employee Monitoring Policy
Definition
How, When, and where the company monitors its employees
Term
Ethical Computer Policy
Definition
General principles to guide computer user behavior
Term
Non-Repudiation
Definition
A contractual stipulation that ebusiness participants do not deny their online actions. Keep emails for this reason.
Term
AUP
Definition
Acceptable Use Policy

A policy a user must agree to follow in order to be provided access to a network or to the internet
Term
Email Problems
Definition
a. Can be read by Service Provider, Recipient’s service provider, router operators, phone companies
Term
User expectation of privacy
Definition
a. Compliment ethical computer use, defines legitimate email users, identifies backup procedures, informs email control, explains ramifications for leaving, asks employees to be careful when posting organizational information
Term
What should you opt out of?
Definition
a. Member directories that may place and email address online
Term
Spam
Definition
Unsolicited Email
Term
Tracking Cookies
Definition
Register on website knows if on computer
Term
Clickstream
Definition
When you track a consumers navigation thru a website
Term
What is information Security
Definition
a. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Term
What is information Security
Definition
a. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Term
What is the first line of defense pertaining to security?
Definition
people
Term
Social Engineering
Definition
a. Using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
Term
3 primary information technology security areas?
Definition
a. Authentication and authorization, prevention and resistance, detection and response
Term
What the method for finding a user ID
Definition
Authentication
Term
What are tokens?
Definition
a. Small electronic devices that change used passwords automatically
Term
Whats a credit card size device that contains embedded technology to perform limited tasks?
Definition
Smart Card
Term
What the identification of a user based on fingerprint, iris, face?
Definition
Biometrics
Term
What is the most costly but most effective authentication technology
Definition
biometrics
Term
What are the security prevention and resistance technologies?
Definition
content filtering, firewall, encryption
Term
Content Filtering?
Definition
prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading
Term
Encryption
Definition
a. If there were a security breach and the information were encrypted then you would be able to read it.
Term
Firewall
Definition
hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Term
What is an example of detection and response technology
Definition
Antivirus software
Term
Trojan Horse
Definition
a. This hides inside other software, usually as an attachment or a downloadable file
Supporting users have an ad free experience!