Term
|
Definition
| Ensuring the accuracy, integrity, and safety of business/IT activities and resources. |
|
|
Term
| Information system controls |
|
Definition
| Control totals, error signals, backup files, and security codes are examples. |
|
|
Term
|
Definition
| Software that can control access and use of a computer system. |
|
|
Term
|
Definition
| A computer system can continue to operate even after a major system failure if it has this capability. |
|
|
Term
|
Definition
| A computer system that serves as a filter for access to and from other networks by a company's networked computers. |
|
|
Term
|
Definition
| Laws and regulations focused on issues related to the Internet and other forms of networked communications. |
|
|
Term
|
Definition
| The presence of documentation that allows a transaction to be traced through all stages of information processing. |
|
|
Term
|
Definition
| Using your voice of fingerprints to identify yourself electronically. |
|
|
Term
| Distributed denial of service |
|
Definition
| A plan to continue IS operations during an emergency. |
|
|
Term
|
Definition
| Scrambling data during its transmission. |
|
|
Term
|
Definition
| Ethical choices may result from decision-making process, cultural values, or behavioral stages. |
|
|
Term
|
Definition
| Managers must confront numerous ethical questions in their businesses. |
|
|
Term
|
Definition
| Sending unsolicited e-mail indiscriminately. |
|
|
Term
|
Definition
| Software that can infect a machine and transmit private information back to its owner. |
|
|
Term
|
Definition
| Two different perspectives on the use of private information. |
|
|
Term
|
Definition
| Using computers to identify individuals that fit a certain profile. |
|
|
Term
|
Definition
| Using computers to identify individuals that will fit a certain profile. |
|
|
Term
|
Definition
| Overwhelming a Web sit with requests for service from captive computers. |
|
|
Term
|
Definition
| Using computers and networks to steal money, services, software, or data. |
|
|
Term
|
Definition
| Using company computers to access the Internet during work hours for personal business. |
|
|
Term
|
Definition
| Unauthorized copying of software |
|
|
Term
| Intellectual property theft |
|
Definition
| Unauthorized copying of copyrighted material. |
|
|
Term
|
Definition
| Electronic breaking and entering into a computer system. |
|
|
Term
|
Definition
| A program that makes copies of itself and destroys data and programs. |
|
|
Term
|
Definition
| Finds and eliminates computer viruses. |
|
|
Term
|
Definition
| Sending extremely critical, derogatory, and vulgar e-mail messages. |
|
|
Term
|
Definition
| Designing computer hardware, software, and workstations that are safe, comfortable, and easy to use. |
|
|