• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
Concerns the collection and use of data about individuals
Privacy
Relates to the responsibility of those who collect data to ensure that the data is correct.
Accuracy
Relates to who owns data and rights to software
Property
Relates to the reponsibility of those who have data to control who is able to use that data
Access
4 Primary Computer Ethics
Privacy
Accuracy
Property
Access
The illegal assumption of someone's identity for the purposes of economic gain
Identity theft
The electronic profile of a person is switched to another
Mistaken Identity
Highly detailed and personalized descriptions of individuals
Electronic Profiles
You are entitled to look at your records held by the goverment agencies
Freedom of Information Act
Records everything that is done on computers for businesses
Snoopware
People think that they are safe online
Illusion of Anonymity
Location sof sites visited by your computer system
history file
specialized programs that are deposited on your hard disk from web sites you have visited
Cookies
monitor your activity at a single site
Traditional Cookies
Monitor you activites across all sites you visit
Adware Cookies
Allow users to selecitvely filter or block the most intrusive cookies while allowing selective traditional cookies to operate
Cookie Cutter Programs
Wide range of programs that are designed to secretly recordand report an individuals activities on the internet
Spyware
Illegal action in which the perpetrator uses special knowledge of computer technology.
Computer Crim
People who gain unauthorized access to a computer system for fun and challenge
Hackers
People that gain unauthorized stuff for malicious purposed
Crackers
Programs that migrate though networks and operation systems and most attach themselves to different programs and databases
Viruses (1994)
Are a special type of virus that does not attach itself to programs and databases.
Worms
Programs that alert users when certain kinds of viruses or worms enter their system
Virus Checkers
Programs that come into a computer system disguised as something else
Trojan Horse
Attempts to slow down or stop a computer system or network
Denial of Service (DoS)
Deceptive act or operation designed to trick individuals into spending their time and money for no return
Scam
Unauthorized copying of programs for personal gain is a form of theft
Software Privacy
Device that separates the computer from the power source of the wall outlet
Surge Protector
Devices such as fingerprint and retinal eye scanners
Biometric Scanning
A security buffer between the corporatioons private network and all external networks, inclding the internet
Firewalls
Protecting hardware from possible human and natural disasters
Physical Security
Protecting software and data from unauthroized tampering
Data Security
Special emergency facilities that back up computer centers
Hot Sites
Empty shells in which hardware must be installed
Cold Sites
Code messages sent over a network
Encrypting
Limit access to authorized persons such as passwords.
Restrictin
Prepare for disasters by ensureing security
Anticipating
Routinely copy data and store it at a remote location
Backing up
The study pof human factors related to things people use
Ergonomics
Program to discourage waste in the microcomputer industry
Energy Star