Shared Flashcard Set

Details

MIS - Chapter 13
Security and Ethical CHallenges
51
Business
Undergraduate 2
05/12/2011

Additional Business Flashcards

 


 

Cards

Term
Ethical responsibility of business professionals
Definition
you have the responsibility to promote ethical uses of information technology in the workplace.
Term
business ethics
Definition
concerned with the numerous ethical questions that managers must confront as part of their daily business decisoin making
Term
theories of ethical decision making
Definition

stockholder theory:  holds that managers are agents of the stockholders, and thier only ethical responsibility is to increase the profits of the business without violating the law

social contract theory:  states that companies have ethical responsibilities to all members of society, which allows corporations to exist according to a socal contract

stakeholder theory: maintains that managers have an ethical respobsibility to manage a firm for the benefit of all its stakeholders, that is, all individuals and groups that have a stake in, or claim on, a company

Term
proportionality;
Definition
the good achieved by the technology must outweigh the harm or risk.  Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk
Term
informed consent
Definition
those affected by the technology should understand and accept the risks
Term
justice
Definition
the benefits and burdens of the technology should be distributed fairly.  THose who benefit should bear their fair share of the risks, and those who do not benefit should not suffer as significant increase in risk
Term
minimized risk
Definition
even if judged acceptable by the other three ghuidelines, the technology must be implemented so as to avoid all unnecessary risk.
Term
computer crime
Definition
including the unauthorized use, access, modificatin, and destruction of hardware, software, data, or network resources.  the unauthorized release of information.  the unauthorized copying of software
Term
cyber crime
Definition
is becoming one of the Net's growth businesses.  Today, criminials are doing everything form stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorism.
Term
hacking
Definition
the obsessive use of computers or the unauthorized access and use of networked computer systems
Term
hacking tactics
Definition
denial of service, scans, sniffer, spoofing, trojan horse, back doors, malicious applets, ware dialing, logie bombs, buffer overflwo, password crackers, social engineering, dumpster diving.
Term
Sniffers
Definition
programs that covertly search individual packets of data as they pass through the internet, capturing apsswords or the entire contents.
Term
cyber theft
Definition
computer crimes that involve the theft of money
Term
Metadata
Definition
data about data
Term
internet abuse in the workplace
Definition
general e-mail abuses, unauthorized usage and access, copyright infringement/plagiarism, newsgroup postings, transmissin of confidential data, pornography, hacking, non-work-related download, leisure use of the internet, usage of external ISPs, moonlighting
Term
workplace internet abuse
Definition
sniffers help prevent this
Term
unauthorized use
Definition
can be called time and resource theft. (basically using the company computers to do stuff that you shouldnt)
Term
website monitoring software
Definition
monitor content, keystrokes, and time spent at the keyboard
Term
software piracy
Definition
unauthorized copying of software
Term
site license
Definition
it legally allows people to make a certain number of copies for use by their employees at a particular location
Term
public domain
Definition
software that is not copyrighted
Term
intellectual property theft
Definition
occurs in the form of infringements of copyrighted materials, such as music, videos, images, articles, books, and such, which courts have deemed illegal
Term
computer virus
Definition
one of the most destructive examples of computer crime. it is a program code that cannot work without being inserted into another program
Term
spyware/addware
Definition
software that , while purporting to serve some useful function and often fultilling that function, also allows internet advertisers to display ads as banners and pop-up ads without the consent of the computer user. they can also collect info about the user and sent it over the internet.
Term
opt-in/opt-out
Definition
an opt-in system automatically protects consumers who do not specifically allow data to be compiled about them. in the uS, opt-out is the default position, whereas in Europe, consumers must opt-in or their information cannot be used.
Term
cookies
Definition
information about internet users is captured legitimately and automatically each time you visit a Web site or newsgroup as is recorded
Term
computer matching
Definition
when a persons physical profile or personal data has been used by profilng software to math them incorrectly or improperly with the wrong individuals.
Term
cyber law
Definition
the term used to describe laws intended to regulate activities over the internet or via the use of electronic data communications. it encompasses a wide variety of legal and political issues related to the internet and other communication technologies
Term
spamming
Definition
the indiscriminate sending of unsolicited e-mail messages to many internet users.
Term
flaming
Definition
the practice of sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup posting to other users on the internet or online services
Term
computer monitoring
Definition
computers are being used to monitor the productivity and behavior of millions of employees while they work
Term
security management
Definition
the goal of this practice is the accuracy, integrity, and safety of all information system processes and resources
Term
encryption
Definition
it involves using special mathematical algorithms, to transform digital data into a scrambled code before they are transmitted, and then to decode the data when they are received.
Term
firewall
Definition
it serves as a gatekeeper system that protects a company's intranets and other computer networks from intrusion by providing a filter and sate transfer point for access to and from the internet and other networks
Term
denial of service attacks
Definition
denial of service assaults ia the Internet depend on three layers of networked computer systesm; 1) the victim's website 2) the victim's internet service provider (ISP) and 3) the sites of "zombie" or slave computers that the cyber criminals commandeered
Term
zombie computers
Definition
can be used to perform malicious tasks of one sort or another under remote direction
Term
employee monitoring
Definition
case study; the company watches people's emails and has it sent to the supervisor if a key word is said
Term
antivirus software
Definition
a type of virus defense
Term
backup file
Definition
duplicate files of data or programs
Term
system security monitor
Definition
programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction
Term
biometric security
Definition
using your voice or fingerprints to identify yourself electronically
Term
fault tolerant
Definition
a computer system can continue to operate even after a major system fialure if it has this capability
Term
disaster recovery
Definition
overwhelming a website with requests for service from captive computers
Term
information system controls
Definition
control totals, error signals, backup files, and security codes are examples. they are methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities
Term
audit trailt
Definition
he presence of documentation that allows a transaction to be traced through all stages of its information processing
Term
blacklisting
Definition
using internet monitoring software to block access to certain sites
Term
Whitelisting
Definition
using Internet monitoring software to only allow access to certain sites
Term
malware
Definition
is programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.[
Term
zero day attacks
Definition
a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or the software developer
Term
conficker
Definition
a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.[1] It uses flaws in Windows software and Dictionary attacks on administrator passwords to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors.
Term
stuxnet
Definition
a Windows computer worm discovered in July 2010 that targets industrial software and equipment
Supporting users have an ad free experience!