Term
|
Definition
| the legal protection afforded an expression of an idea |
|
|
Term
|
Definition
| intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents |
|
|
Term
|
Definition
| the principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
| the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent |
|
|
Term
|
Definition
| the assurance that messages and information remain aviailable only to those authorized to view them |
|
|
Term
|
Definition
| govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself |
|
|
Term
|
Definition
| the unauthorized use, duplication, distribution, or sale of copyrighted software |
|
|
Term
|
Definition
| software that is manufactured to look like the real thing and sold as such |
|
|
Term
|
Definition
| examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow efficiently |
|
|
Term
|
Definition
| a method or system of government for information manafement or control |
|
|
Term
|
Definition
| the act of conforming, acquiescing, or yielding information |
|
|
Term
| ediscovery (electronic discovery) |
|
Definition
| the abilityof a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry |
|
|
Term
|
Definition
| policies and procedures that address information management along with the ethical use of computer and the Internet in the business environment |
|
|
Term
| ethical computer use policy |
|
Definition
| contains general principles to guide computer user behavior |
|
|
Term
| information privacy policy |
|
Definition
| contains general principles regarding information privacy |
|
|
Term
|
Definition
| requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet |
|
|
Term
|
Definition
| a contractual stipulation ton ensure the ebusiness participants do not deny (repudiate) their online actions |
|
|
Term
|
Definition
| contains general principles to guide the proper use of the Internet |
|
|
Term
|
Definition
| details the extent to which email messages may be read by others |
|
|
Term
|
Definition
| sens a massive amount of email to a specific person or system that can cause that user's server to stop functioning |
|
|
Term
|
Definition
|
|
Term
|
Definition
| states taht email users will not send unsolicited emails (or spam) |
|
|
Term
|
Definition
| outlines the corporate guidlines or principles governming employee online communications |
|
|
Term
| information technology monitoring |
|
Definition
| tracks people's activities by such measures as number keystrokes, error rate, and number of transactions processed |
|
|
Term
| employee monitoring policy |
|
Definition
| stating explicitly how, when, and where the company monitors its employees |
|
|
Term
|
Definition
| a period of time when a system is unavailable |
|
|
Term
|
Definition
| a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
| experts in technology who use their knowledge to break into computers and computer networkds, either for profit or just motivated by the challenge |
|
|
Term
|
Definition
| break int other people's computer system and may just look around or steal and destroy information |
|
|
Term
|
Definition
| have criminal intent when hacking |
|
|
Term
|
Definition
| seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destructionn |
|
|
Term
|
Definition
| have philosphical and political reasons for breaking into systems and will often deface the website as a protest |
|
|
Term
| script kiddies (script bunnies) |
|
Definition
| find hacking code on the Internet and clock-and-point their way into systems to cause damage or spread viruses |
|
|
Term
|
Definition
| work at the request of the system owners to find system vulnerabilities and plug the holes |
|
|
Term
|
Definition
| software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
| software that, while purporting to serve some useful function and often fulfilling that function, also allows the Internet advertisers to display advertisements without the consent of the computer user |
|
|
Term
|
Definition
| a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission |
|
|
Term
|
Definition
| open ways into the network for future attacks |
|
|
Term
| denial-of-service attack (DoS) |
|
Definition
| floods a website with so many requests for service that it slows down or crashed the site |
|
|
Term
| distributed denial-of-service attack (DDoS) |
|
Definition
| attacks from multiple computer that flood a website with so many requests for service that it slows down or crashes |
|
|
Term
| polymorphic viruses and worms |
|
Definition
| change their form as they propogate |
|
|
Term
|
Definition
| hides inside other software, usually as an attachment of a downloadable file |
|
|
Term
|
Definition
| spreads itself, not only from file to file, but also from computer to computer and can tunnel themselves into computers |
|
|
Term
|
Definition
| a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system |
|
|
Term
|
Definition
| attack computer systems by transmitting a virus hoax, with a real virus attached |
|
|
Term
|
Definition
| includes a variety of threats such as viruses, worms, and Trojan horses |
|
|
Term
|
Definition
| consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network |
|
|
Term
|
Definition
| a program or device that can monitor data traveling over a network |
|
|
Term
|
Definition
| the forging of the return address on an email so that the message appears to come from someone other than the actual sender |
|
|
Term
|
Definition
| fake blogs created soley to raise the search engine rank of affiliated websites |
|
|
Term
|
Definition
| software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
| legitimate users who purposely or accidently misuse their access to the environment and cause some kind of business-affecting incident |
|
|
Term
|
Definition
| hackers use their social skills to trick people into revealing access credentials or other valuable information |
|
|
Term
|
Definition
| looking through people's trash |
|
|
Term
| information security policies |
|
Definition
| identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days |
|
|
Term
| information security plan |
|
Definition
| details how an organization will implement the information security policies |
|
|
Term
|
Definition
| the forging of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
| a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought they came from legitimate businesses |
|
|
Term
|
Definition
| reroutes requests for legitimate websites to false websites |
|
|
Term
|
Definition
| a method of confirming users' identities |
|
|
Term
|
Definition
| the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space |
|
|
Term
|
Definition
| small electronic devices that cahnge useres passwords automatically |
|
|
Term
|
Definition
| a device about the size of a credit card, containing embedded tachnologies that can store information and small amount of software to perform some limited processing |
|
|
Term
|
Definition
| the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting |
|
|
Term
|
Definition
| occurs when organization use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information |
|
|
Term
|
Definition
| scambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
| public key encription (PKE) |
|
Definition
| uses two keys: a public key that everyone can have asn a private key for only the recipient |
|
|
Term
|
Definition
| a trusted third party that validates use identities by means of digital certificates |
|
|
Term
|
Definition
| a data file that indentifies individuals or organizations online and comparable to a digital signature |
|
|
Term
|
Definition
| a hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings |
|
|
Term
|
Definition
| scans and searches hard drives to prevent, detect, and remove known ciruses, adware, and spyware |
|
|
Term
| intrusion detection software (IDS) |
|
Definition
| features full-time monitoring tools that search for patterns in network traffic to identify intruders |
|
|