Shared Flashcard Set

Details

MIS 250 Notecards
Exam 3 Chapter 10
10
Business
Undergraduate 2
11/28/2012

Additional Business Flashcards

 


 

Cards

Term
-Natural Disasters
-Accidents
-Employees and consultants
-Links to Outside Business Contacts
-Outsiders
Definition
What are the primary threats to IS security?
Term
The act of using a computer to commit an illegal act including:
-Targeting a computer to commit an offense
-Using a computer to commit an offense
-Using a computer to support criminal activity
Definition
What is a computer crime?
Term
-Hackers gain access to computer systems without authorization (started at MIT)
-Crackers intend on breaking into a computer system without malicious intent
-Hactivists intend on spreading a political or idealogic goal through defacing a website
Definition
Differentiate between types of computer criminals (i.e. hackers, crackers, hactivists)
Term
-Unauthorized access occurs when people who are not authorized look through, manipulate or handle stored data (over-shoulder viewing, breaking in, obtaining information for sale)
-Change information through cracking (changing an employee's bonus)
Definition
Differentiate between types of computer crimes (i.e., unauthorized access and information modification).
Term
Short for 'malicious software' which causes organizations money every year.
Definition
What is malware?
Term
viruses-a destructive program that disrupts the normal function of a computer. It can reproduce itself
worms-similar to a virus, but targeted at networks. Can corrupt servers which will deny internet service to customer
trojan horses-appear to be running a program normally when downloaded, but run background programs which can corrupt computers
Definition
?What types of malware are there
Term
Stealing of a person's social security number, credit card number, and credit score to withdraw money, make purchases, and run up debts that won't be repaid.
Definition
What is identity theft?
Term
Passing on of information about current events. Spammers may harvest information to flood in-boxes with junk-mail.
Definition
What is an internet hoax?
Term
Cyberharrassment-using a computer to communicate obscene, vulgar, or threatening messages that could cause distress to others
Cyberstalking-Repeated contacts with another person
Cyberbullying-Use of the internet to deliberately cause emotional distress to someone
Definition
Differentiate between cyberharrassment, cyberstalking and cyberbullying.
Term
The purchase of one copy of a software application and then make many copies to distribute to others
Definition
What is software piracy?
Supporting users have an ad free experience!