Shared Flashcard Set

Details

INFO Chapter 4
Exam 2
72
Business
Undergraduate 1
10/01/2012

Additional Business Flashcards

 


 

Cards

Term
copyright
Definition
the legal protection afforded an expression of an idea
Term
intellectualy property
Definition
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
Term
ethics
Definition
the principles and standards that guide our behavior toward other people 
Term
privacy
Definition
the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent 
Term
confidentiality 
Definition
the assurance that messages and information remain aviailable only to those authorized to view them 
Term
information ethics
Definition
govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself
Term
pirated software
Definition
the unauthorized use, duplication, distribution, or sale of copyrighted software
Term
couterfeit software
Definition
software that is manufactured to look like the real thing and sold as such
Term
information management
Definition
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow efficiently 
Term
information governance
Definition
a method or system of government for information manafement or control
Term
information compliance
Definition
the act of conforming, acquiescing, or yielding information
Term
ediscovery (electronic discovery)
Definition
the abilityof a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry 
Term
epolicies
Definition
policies and procedures that address information management along with the ethical use of computer and the Internet in the business environment 
Term
ethical computer use policy
Definition
contains general principles to guide computer user behavior
Term
information privacy policy
Definition
contains general principles regarding information privacy
Term
acceptable use policy
Definition
requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Term
Nonrepudiation
Definition
a contractual stipulation ton ensure the ebusiness participants do not deny (repudiate) their online actions
Term
internet use policy
Definition
contains general principles to guide the proper use of the Internet 
Term
email privacy policy
Definition
details the extent to which email messages may be read by others 
Term
mail bomb
Definition
sens a massive amount of email to a specific person or system that can cause that user's server to stop functioning
Term
spam
Definition
unsolicited email 
Term
anti-spam policy
Definition
states taht email users will not send unsolicited emails (or spam)
Term
social media policy
Definition
outlines the corporate guidlines or principles governming employee online communications
Term
information technology monitoring
Definition
tracks people's activities by such measures as number keystrokes, error rate, and number of transactions processed
Term
employee monitoring policy
Definition
stating explicitly how, when, and where the company monitors its employees 
Term
Downtime
Definition
a period of time when a system is unavailable 
Term
information security
Definition
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Term
hackers
Definition
experts in technology who use their knowledge to break into computers and computer networkds, either for profit or just motivated by the challenge 
Term
black-hat hackers
Definition
break int other people's computer system and may just look around or steal and destroy information
Term
crackers
Definition
have criminal intent when hacking
Term
cybertrrorists
Definition
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destructionn
Term
hactivists
Definition
have philosphical and political reasons for breaking into systems and will often deface the website as a protest
Term
script kiddies (script bunnies)
Definition
find hacking code on the Internet and clock-and-point their way into systems to cause damage or spread viruses
Term
white-hat hackers
Definition
work at the request of the system owners to find system vulnerabilities and plug the holes 
Term
virus
Definition
software written with malicious intent to cause annoyance or damage
Term
adware
Definition
software that, while purporting to serve some useful function and often fulfilling that function, also allows the Internet advertisers to display advertisements without the consent of the computer user 
Term
spyware
Definition
a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Term
backdoor programs
Definition
open ways into the network for future attacks
Term
denial-of-service attack (DoS)
Definition
floods a website with so many requests for service that it slows down or crashed the site 
Term
distributed denial-of-service attack (DDoS)
Definition
attacks from multiple computer that flood a website with so many requests for service that it slows down or crashes
Term
polymorphic viruses and worms
Definition
change their form as they propogate
Term
trojan-horse virus
Definition
hides inside other software, usually as an attachment of a downloadable file
Term
worm
Definition
spreads itself, not only from file to file, but also from computer to computer and can tunnel themselves into computers
Term
elevation of privaledge
Definition
a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system
Term
hoaxes
Definition
attack computer systems by transmitting a virus hoax, with a real virus attached 
Term
malicious code
Definition
includes a variety of threats such as viruses, worms, and Trojan horses
Term
packet tampering
Definition
consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network
Term
sniffer
Definition
a program or device that can monitor data traveling over a network
Term
spoofing 
Definition
the forging of the return address on an email so that the message appears to come from someone other than the actual sender
Term
splogs (spam blogs)
Definition
fake blogs created soley to raise the search engine rank of affiliated websites
Term
spyware
Definition
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about 
Term
insiders
Definition
legitimate users who purposely or accidently misuse their access to the environment and cause some kind of business-affecting incident
Term
social engineering
Definition
hackers use their social skills to trick people into revealing access credentials or other valuable information
Term
dumpster diving
Definition
looking through people's trash
Term
information security policies
Definition
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
Term
information security plan
Definition
details how an organization will implement the information security policies
Term
identity theft
Definition
the forging of someone's identity for the purpose of fraud
Term
phishing
Definition
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought they came from legitimate businesses
Term
pharming
Definition
reroutes requests for legitimate websites to false websites
Term
authentication
Definition
a method of confirming users' identities
Term
authorization
Definition
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space
Term
tokens
Definition
small electronic devices that cahnge useres passwords automatically
Term
smart card
Definition
a device about the size of a credit card, containing embedded tachnologies that can store information and small amount of software to perform some limited processing 
Term
biometrics
Definition
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
Term
content filtering
Definition
occurs when organization use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information 
Term
encryption
Definition
scambles information into an alternative form that requires a key or password to decrypt
Term
public key encription (PKE)
Definition
uses two keys: a public key that everyone can have asn a private key for only the recipient
Term
certificate authority
Definition
a trusted third party that validates use identities by means of digital certificates
Term
digital certificate
Definition
a data file that indentifies individuals or organizations online and comparable to a digital signature
Term
firewall
Definition
a hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings 
Term
antivirus software
Definition
scans and searches hard drives to prevent, detect, and remove known ciruses, adware, and spyware
Term
intrusion detection software (IDS)
Definition
features full-time monitoring tools that search for patterns in network traffic to identify intruders
Supporting users have an ad free experience!