Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
What is communication? |
Theimparting, sharing or exchanging of ideas thoughts, messages, or informationbetween people by speech, signals, writing, or behaviour
|
|
What does communication influence? |
Relationship, Ability to Interact, Self-Expression and Success |
|
What are the 5 levels of communication? |
Group, Mass, Intrapersonal, Interpersonal, Public |
|
What is Non-verbal communication? |
Oldest form of social interaction used by humans, communicating through body language |
|
What are Non-verbal Elements? |
Body language, Physical Characteristics, Touching, Vocal Quality, Use of Space, Apprearance |
|
What is Plagiarism? |
Academic and public dishonesty, latin name of "kidnapper" |
|
What are the four categories of ethical issues in business? |
Intellectual property rights, Workplace safety, security of company information and customer and employee privacy |
|
What are the 3 Social Responsibility Theories? |
Stockholder Theory, Stakeholder Theory and Social Contract Theory |
|
What is Stockholder Theory? |
Managers are agents of the stockholders, increase profit without violating the law |
|
What is Stakeholder theory? |
Managers have a responsibility to manage an organisation for the benefit of all its stakeholders |
|
What is Social Contract Theory? |
Companies have ethical responsibilities to all members of society |
|
What is Denial of Service(DoS) ? |
Hammering a websites equipment with too many requests for information, clogging the system, slowing performance or crashing the site |
|
What are Scans? |
Widespread probes of the internet to determine types of computers, services and connections looking for weaknesses |
|
What are Sniffer programmes? |
Programs that covertly search individual packets of data as they pass through the internet, capturing passwords of the entire contents |
|
What is Spoofing? |
Faking an email address of Web page to trick users into passing along passwords or credit card details |
|
What is a Trojan Horse? |
A program that unknown to the user contains instructions that exploit a known vulnerability in some software |
|
What are Malicious Applets? |
Tiny Java programs that misuse your computer resources, modify files on the hard disk, send fake emails or steal passwords |
|
What is War Dialing? |
Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection |
|
What are Logic bombs? |
An instruction in a computer program that triggers a malicious act |
|
What are Password Crackers? |
Software that can guess passwords (brute force) |
|
What is Buffer Overflow? |
Crashing or gaining control of a computer by sending too much data to buffer memory |
|
What is Social Engineering? |
Gaining access to computer systems by talking unsuspecting company employees out of valuable information |
|
What is Dumpster Diving? |
Sifting through a company's garbage to find information to help break into their computers |
|
What are back doors? |
A hidden point of entry to be used in case the original entry point is detected or blocked |
|
What is a virus? |
Viruses must be inserted into another programme Commonly transmitted through: The Internet and online services Email and file attachments Discs from contaminated computers Shareware |
|
What are worms? |
Worms can run unaided Commonly transmitted through:The Internet and online servicesEmail and file attachments Discs from contaminated computers Shareware |
|
What is Adware? |
Adware allows advertisers to display pop-up and banner ads without the consent of the computer users |
|
What is Spyware? |
Type of adware, can steal private information ,add advertising links to web pages redirect affiliate payments, change a user's home page and search settings, make modem call premium-rate numbers, leave security holes that let Trojans in, degrade system performance |
|
How does IT create a negative effect on privacy? |
Personal information is collected with every web site visit, confidential information can be stolen or misused |
|
What is Opt-in privacy? |
Must explicity consent to allow data to be complied, default for consumers and in Europe |
|
What is Opt-Out data? |
Must request data is not collected, defualt in the US |
|
What are 4 ways to protect privacy on the internet? |
Encrypt email, send newsgroup postings through anonymous remailers, ask your ISP not to sell your name information to mailing list providers and other marketers, dont reveal personal data and interests on online |
|
What are the 4 types of licensing? |
Purchase, site license for a number of copies, shareware and public domain |
|
What is Intellectual Property? |
Copyrighted material, music, videos, images etc |
|
What is data encryption? |
Using special mathematical algorithims or keys to transform digital data into a scrambled code |
|
What is the most common encryption? |
Through public and private keys |
|
What is a zombie computer? |
A computer that has been secretly infiltrated by a hacker to conduct illegal activities |
|
How do you defend DoS from Zombie Machines? |
Scan for vulnerabilities, close unused ports, remind users not to open .exe mail attachments |
|
How do you defend DoS at the ISP? |
Monitor and block traffic spikes, filter spoof IP addresses, coordinate security with network providers |
|
How do you defend DoS at the victims website? |
Create backup servers and network connections, limit connections to each server,install multiple intrusion-detection systems and multiple routers for incoming traffic to reduce choke points |
|
What are biometrics? |
Computer devices that measure physical traits that are unique to each individual |
|
What are types of biometric security? |
Voice recognition, Fingerprints, Retina scan, Hand geometry, Signature dynamics, Keystroke dynamics, Keystroke analysis,Face recognition |
|
What is email monitoring? |
Use of content-monitoring software to scan for troublesome words to prevent hackers from spreading viruses or breaking into networked computers |
|
What are computer failure controls? |
Controls to prevent computer failures, preentive maintenance e.g backups |
|
What are the 3 failure control capabilitys? |
Fail-over, Fail-save and Fail-soft |
|
What are natural disasters? |
Floods/fire and Human made criminal acts |
|
What is in a disaster recovery plan? |
Which employee will participate, what their duties will be , what hardware/software will be used, use of alternative facilities and offsite storage of databases |
|
What is the Privacy Act 1993? |
Controls how agencies collect, use, disclose, store and give access to personal information |
|
What is an agency? |
Every person or organisation that holds personal information |
|
When was the treaty of Waitangi? |
February, 1840 |
|
What did Maori and Crown think they were recieving |
Crown understood they were getting sovereignty , Maori understood that were giving governance |
|
What are 4 examples of protecting yourself against computer crime? |
Use antivirus and firewall software, install all os patches and upgrdes, Use hard to guess passwords, only use secure sites with credit card details |
|
What are the 3 strikes of the copyright bill? |
Detection Notice, Warning Notice and Enforcement Notice |
|
What is intellectual property? |
Human innovations and creativity |
|
What are the 6 remedies to the The Copyright act 1994 and the Trade Marks Act 2002? |
Damages, Injunctions, Orders to account for profits, Deliver good to owners, $15,000 fine, 5 years in prison |