Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
52 Cards in this Set
- Front
- Back
The principles and standards that guide our behavior toward other people
|
Ethics
|
|
Includes Privacy and confidentialiry
|
ePolicies
|
|
Deleting an e-mail from the recipient's computer does not delete it from the sender's computer or the provider's computers.
|
E-mail privacty policy
|
|
What has no ethics, does not care how it is used, will not stop itself from sending spam, viruses, or highly-sensitive information, and cannot delete or preserve itself?
|
Information
|
|
Individuals copy, use, and distribute software; employees search organizational databases for sensitive corporate and personal information; organiztions collect, buy, and use info without checking the validity or accuracy of the info; individuals create and spread viruses that cause trouble for those using and maintaining IT systems; individuals hack into computer systems to steal proprietary info; employees destroy or steal proprietary organization info such as schematics, sketches, customer lists, and reports.
|
Examples of Questionable Information Technology use.
|
|
Key logger or key trapper software, hardware key logger, cookie, adware, spyware, web log, clickstream
|
Common Monitoring Technologies
|
|
Employee absenteeism, lower job satisfaction, psychological reactance
|
Employee Monitoring Effects
|
|
Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context or effective decisions and actions.
|
Knowledge Management
|
|
Supports the capturing, organization, and dissemination of knowlege (i.e. know-how) throughout an organization.
|
Knowledge Management Systems
|
|
Raw Information
|
Data
|
|
Putting data together
|
Information
|
|
What you do with information
|
Knowledge
|
|
Hard knowledge; data
|
Explicit Knowledge
|
|
In your head, thoughts, decision process
|
Tacit Knowledge
|
|
Telecommuting, online meetings, remote projects, deploying applications
|
KM Applications
|
|
KMS, CMS, WMS, GS
|
Collaboration Systems
|
|
provides tools to manage the creation, storage, and publication of information in a collaborative environment.
|
Content management
|
|
Defines all the steps or business rules, from beginning to end, required for a business process.
|
Workflow
|
|
facilitate the automation and management of business processes and control the movement of work through the business process.
|
Workflow Management Systems
|
|
Synchronous
|
Same Time
|
|
Asynchronous
|
Different Time
|
|
What is the recommended way to implement information security lines of defense?
|
People first, technology second
|
|
What is the most secure type of authentication?
|
Combination of all of the above: finger print, password/username, etc.
|
|
Which is not one of the three primary information security areas?
|
Detection and Resistance
|
|
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
|
Sarbanes-Oxley Act
|
|
What are the principles and standards that guide our behavior toward other people?
|
ethics
|
|
which of the following isn't included in the four quadrants of ethical and legal behavior?
|
None of the above
|
|
T/F: Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
|
True
|
|
T/F: A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.
|
True
|
|
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
|
Information Security
|
|
First Line of Defense
|
People
|
|
Second line of defense
|
Technology
|
|
Social engineering, Firewalls
|
Ways to defend people
|
|
Authentication & Authorization, Prevention & Resistance, Detection & Response
|
Ways to defend technology
|
|
Smart card & Biometrics
|
Examples of Information Security
|
|
Sends the same public key to all customers and uses a private key to decrypt the information received
|
Encryption
|
|
Unsolicited email, often of a commercial nature, send indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail.
|
Spam
|
|
The practice of conning people into revealing sensitive data on a computer system, often on the Internet
|
Social engineering
|
|
Identifies rules to maintain Information security
|
Security Policy
|
|
details how an organization will implement the security policy
|
Security Plan
|
|
Username/Password, fingerprint, smart card
|
Authentication & Authorization
|
|
the forging of a persons identity in order to perform a fraud
|
Identity theft
|
|
technique to gain personal information for the purpose of identity theft
|
phishing
|
|
scrambles information
|
Encryption
|
|
hardware and software that guards info leaving and entering a system
|
Firewalls
|
|
a person knowledgable of computers that uses their knowledge in order to invade others computer
|
hacker
|
|
intended to harm content
|
virus
|
|
a program that appears to be legimate but is not. It will later cause trouble
|
Trojan horse
|
|
paris hilton
|
ex. of social engineering
|
|
What are the possible ethical issues that can arise from internet security?
|
an individual might take a course on hacking just to learn how to hack.
|
|
Gang of hackers
|
ShadowCrew WebMob
|
|
Security Connections
|
1. Behavior 2. Anti-virus, anti-spyware, and firewalls 3. Physical controls and system controls 4. Encryption
|