-
Ethics
A term that refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.
-
Code of Ethics
A collection of principles that are intended to guide decision making by members of the organization.
-
Responsibility
A term that means you accept the consequences of your decisions and actions.
-
Accountability
A term that means a determination of who is reponsible for actions that were taken.
-
Liability
A legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
-
Is Unethical and Illegal the same?
No, unethical is not necessarily illegal.
-
What is the Sarbanes-Oxley Act of 2002?
This law requires that public companies implement financial controls and that, to ensure accountability, executives must personally certify financial reports.
-
What does improvements in IT cause?
Improvesments in IT are causing an increasing number of ethical problems.
-
What is IT
Information Technology
-
What do Computer Networks do?
Computer networks, particularly the Internet, enable organizations to collect, integrate, and distriute enormous amounts of information on individuals, groups, and institutions.
-
What are Privacy Issues?
Involve collecting, storing and disseminating information about individuals.
-
What are Accuracy Issues?
Involve the authenticity, fidelity, and accuracy of information that is collected and processed.
-
What are Property Issues?
Involve the ownership and value of information.
-
What are Accessiblilty Issues?
They revolve around who should have access to information and whether they should have to pay for this access.
-
Privacy
The right to be left alone and to be free of unreasonable personal intrusion.
-
Is the right to privacy absolute?
No, privacy must be balanced against the needs of society.
-
Does the public have the right to know?
Yes, the publics right to know supersedes the individuals right of privacy.
-
Digital Dossier
An electronic description of a use and his or her habits.
-
Profiling
The process of compling a digital dossier on a person.
-
What is Customer Intimacy?
When dossiers are sold to companies that want to know their customers better.
-
Electronic Surveillance
Monitoring or tracking peoples activities with the aid of computers.
-
What is URL filtering?
When a company uses software to block connections to inappropriate Web sites.
-
Trusted versus Untrusted Network
A trusted network is any network within your organization, whereas an untrusted network is any network external to your organization.
-
Wireless Technologies
Allow access to the Internet anywhere and anythime, they are an inherently nonsecure broadcast communications medium.
-
Governmental Legislation
Dictates that many types of information must be protected by law.
-
Gramm-Leach-Bliley Act
Requires companies to notify consumers of privacy policies and to provide opt-out provisions, it also protects nonpublic financial data.
-
Privacy Policies
An organizations guidelines with respect to protecting the privacy of customers, clients, and employees.
-
Hacker
Computing skills necessary to be a hacker are decreasing.
-
Scripts
Users with fre computer skills can download and use to attack any IS connected to the internet.
-
Cybercrime
Illegal activities executed on the internet.
-
SLA
Service Level Agreement, it spells out specific requirements and establihes a security standard.
-
Social Engineering
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privilages.
-
Reverse Social Engineering
A type of attack in which employees approach the attacker.
-
Deviations in Service Quality by Providers.
Consists of situations in which a product or service is not delivered to the organization as expected.
-
Enviornmental Hazards
Include dirt, dust, humidity, and static electricity.
-
Natural Diasters
These included floods, earthquakes, hurricanes, tornados, lightning and in some cases fire.
-
Technical Failures
Include problems with hardware and or software.
-
What is Pod Slurping?
Plugging in a device to a USB port that downloads huge amount of information quickly and easily.
-
What is Dumpster Diving?
Involves the practice of rummaging through commercial or residential trash to find information that been discarded.
-
Identity Theft
Crime in which someone steals the personal information of others to create a false identity and then uses it for some fraud.
-
Intellectual property
The intangible property created by individuals or corporations, which is protected under trade secret, patent and copyright laws.
-
Trade Secret
Intellectual work, such as a business plan, that is a company secret and is not based on public information.
-
What is a Patent?
A document that grants the holder exclusive rights on an invention or process for 20 years.
-
Single Factor Authentication
Is weak and consists of a password only.
-
Two-factor Authentication
Consists of a password plus one type of biometric identification.
-
Three-factor Authentication
Any combination of three authentication methods.
-
Privilege
A collection of related computer system operation that can be performed by users of the system profiling.
-
Copyright
A grant that provides the creator of intellectual property with ownership of it for the life of the creator puls 70 years.
-
Priacy
Copying a sofware program without making payment to the owner.
-
BSA
- Business Software Alliance
- Represents the worlds commercial sofware industry.
-
NIPC
Partnership between government and industry designed to protect the nations infrastructure.
-
Security Controls
Designed to protect all of the components of an information System.
|
|