WGU D333 Ethics in Technology - WGU
A document that stipulates restrictions
and practices that a user must agree in
acceptable use policy (AUP)
order to use organizational computing
and network resources.
When an organization decides to ac-
cept a risk because the cost of avoid-
ing the risk outweighs the potential loss
of the risk. A decision to accept a risk
can be extremely difficult and contro-
versial when dealing with safety-critical
systems because making that determi-
acceptance
nation involves forming personal judg-
ments about the value of human life, as-
sessing potential liability in case of an
accident, evaluating the potential impact
on the surrounding natural environment,
and estimating the system's costs and
benefits.
A network attack in which an intruder
gains access to a network and stays
there—undetected—with the intention of advanced persistent threat (APT)
stealing data over a long period of time
(weeks or even months).
A software development methodology in agile development
which a system is developed in iterations
lasting from one to four weeks. Unlike
the waterfall system development model,
agile development accepts the fact that
system requirements are evolving and
cannot be fully understood or defined at
the start of the project.
An agreement of the World Trade Orga-
nization that requires member govern-
ments to ensure that intellectual property Agreement on Trade-Related Aspects of
rights can be enforced under their laws Intellectual Property Rights (TRIPS)
and that penalties for infringement are
tough enough to deter further violations.
, WGU D333 Ethics in Technology - WGU
A wide-ranging act that authorized $787
billion in spending and tax cuts over
a 10-year period and included strong
privacy provisions for electronic health American Recovery and Reinvestment
records, such as banning the sale of Act
health information, promoting the use of
audit trails and encryption, and providing
rights of access for patients.
The estimated loss from a potential risk
event over the course of a year. The fol-
lowing equation is used to calculate the
annual loss expectancy: ARO × SLE =
ALE. Where ARO is the annualized rate
annualized loss expectancy (ALE)
of occurrence, an estimate of the prob-
ability that this event will occur over the
course of a year and SLE is the single
loss expectancy, the estimated loss that
would be incurred if the event happens.
An estimate of the probability that a risk
annualized rate of occurrence (ARO)
event will occur over the course of a year.
The expression of opinions by people
anonymous expression
who do not reveal their identity.
A service that allows anonymity on the
Internet by using a computer program
that strips the originating header and/or
anonymous remailer service
IP address from the message and then
forwards the message to its intended re-
cipient.
Laws designed to reduce frivolous
SLAPPs (strategic lawsuit against public
participation (SLAPP), which is a law-
suit filed by corporations, government of- anti-SLAPP laws
ficials, and others against citizens and
community groups who oppose them on
matters of concern).
Software that scans for a specific se-
quence of bytes, known as a virus sig-
, WGU D333 Ethics in Technology - WGU
nature, that indicates the presence of a
antivirus software
specific virus.
The people, procedures, hardware, soft-
ware, data, and knowledge needed to
develop computer systems and ma-
chines that can simulate human intelli-
gence processes, including learning (the
acquisition of information and rules for artificial intelligence systems
using the information), reasoning (using
rules to reach conclusions), and self-cor-
rection (using the outcome from one sce-
nario to improve its performance on fu-
ture scenarios).
A group that provides assistance to the
board of directors in fulfilling its responsi-
bilities with respect to the oversight of the
quality and integrity of the organization's
accounting and reporting practices and
controls, including financial statements
audit committee
and reports; the organization's compli-
ance with legal and regulatory require-
ments; the qualifications, independence,
and performance of the company's inde-
pendent auditor; and the performance of
the company's internal audit team.
The elimination of a vulnerability that
gives rise to a particular risk in order to
avoid the risk altogether. This is the most
avoidance
effective solution but often not possible
due to organizational requirements and
factors beyond an organization's control.
The moral corruption of people in power,
which is often facilitated by a tendency
Bathsheba syndrome
for people to look the other way when
their leaders act inappropriately.
A method or technique that has consis-
tently shown results superior to those
, WGU D333 Ethics in Technology - WGU
achieved with other means and that is
used as a benchmark within a particular best practice
industry.
The first 10 amendments to the United
States Constitution that spell out addi- Bill of Rights
tional rights of individuals.
A type of dynamic testing that involves
viewing the software unit as a device
that has expected input and output be- black-box testing
haviors but whose internal workings are
unknown (a black box).
A sophisticated threat that combines the
features of a virus, worm, Trojan horse,
blended threat
and other malicious code into a single
payload.
An agreed-upon sets of skills and abili-
ties that all licensed professionals must body of knowledge
possess.
A large group of computers, which are
controlled from one or more remote loca-
botnet
tions by hackers, without the knowledge
or consent of their owners.
The failure of one party to meet the terms
breach of contract
of a contract.
The failure to act as a reasonable person
breach of the duty of care
would act.
When a product fails to meet the terms
breach of warranty
of its warranty.
The act of providing money, property, or
favors to someone in business or gov-
bribery
ernment in order to obtain a business
advantage.
A business policy that permits, and
in some cases, encourages employ-
ees to use their own mobile devices
A document that stipulates restrictions
and practices that a user must agree in
acceptable use policy (AUP)
order to use organizational computing
and network resources.
When an organization decides to ac-
cept a risk because the cost of avoid-
ing the risk outweighs the potential loss
of the risk. A decision to accept a risk
can be extremely difficult and contro-
versial when dealing with safety-critical
systems because making that determi-
acceptance
nation involves forming personal judg-
ments about the value of human life, as-
sessing potential liability in case of an
accident, evaluating the potential impact
on the surrounding natural environment,
and estimating the system's costs and
benefits.
A network attack in which an intruder
gains access to a network and stays
there—undetected—with the intention of advanced persistent threat (APT)
stealing data over a long period of time
(weeks or even months).
A software development methodology in agile development
which a system is developed in iterations
lasting from one to four weeks. Unlike
the waterfall system development model,
agile development accepts the fact that
system requirements are evolving and
cannot be fully understood or defined at
the start of the project.
An agreement of the World Trade Orga-
nization that requires member govern-
ments to ensure that intellectual property Agreement on Trade-Related Aspects of
rights can be enforced under their laws Intellectual Property Rights (TRIPS)
and that penalties for infringement are
tough enough to deter further violations.
, WGU D333 Ethics in Technology - WGU
A wide-ranging act that authorized $787
billion in spending and tax cuts over
a 10-year period and included strong
privacy provisions for electronic health American Recovery and Reinvestment
records, such as banning the sale of Act
health information, promoting the use of
audit trails and encryption, and providing
rights of access for patients.
The estimated loss from a potential risk
event over the course of a year. The fol-
lowing equation is used to calculate the
annual loss expectancy: ARO × SLE =
ALE. Where ARO is the annualized rate
annualized loss expectancy (ALE)
of occurrence, an estimate of the prob-
ability that this event will occur over the
course of a year and SLE is the single
loss expectancy, the estimated loss that
would be incurred if the event happens.
An estimate of the probability that a risk
annualized rate of occurrence (ARO)
event will occur over the course of a year.
The expression of opinions by people
anonymous expression
who do not reveal their identity.
A service that allows anonymity on the
Internet by using a computer program
that strips the originating header and/or
anonymous remailer service
IP address from the message and then
forwards the message to its intended re-
cipient.
Laws designed to reduce frivolous
SLAPPs (strategic lawsuit against public
participation (SLAPP), which is a law-
suit filed by corporations, government of- anti-SLAPP laws
ficials, and others against citizens and
community groups who oppose them on
matters of concern).
Software that scans for a specific se-
quence of bytes, known as a virus sig-
, WGU D333 Ethics in Technology - WGU
nature, that indicates the presence of a
antivirus software
specific virus.
The people, procedures, hardware, soft-
ware, data, and knowledge needed to
develop computer systems and ma-
chines that can simulate human intelli-
gence processes, including learning (the
acquisition of information and rules for artificial intelligence systems
using the information), reasoning (using
rules to reach conclusions), and self-cor-
rection (using the outcome from one sce-
nario to improve its performance on fu-
ture scenarios).
A group that provides assistance to the
board of directors in fulfilling its responsi-
bilities with respect to the oversight of the
quality and integrity of the organization's
accounting and reporting practices and
controls, including financial statements
audit committee
and reports; the organization's compli-
ance with legal and regulatory require-
ments; the qualifications, independence,
and performance of the company's inde-
pendent auditor; and the performance of
the company's internal audit team.
The elimination of a vulnerability that
gives rise to a particular risk in order to
avoid the risk altogether. This is the most
avoidance
effective solution but often not possible
due to organizational requirements and
factors beyond an organization's control.
The moral corruption of people in power,
which is often facilitated by a tendency
Bathsheba syndrome
for people to look the other way when
their leaders act inappropriately.
A method or technique that has consis-
tently shown results superior to those
, WGU D333 Ethics in Technology - WGU
achieved with other means and that is
used as a benchmark within a particular best practice
industry.
The first 10 amendments to the United
States Constitution that spell out addi- Bill of Rights
tional rights of individuals.
A type of dynamic testing that involves
viewing the software unit as a device
that has expected input and output be- black-box testing
haviors but whose internal workings are
unknown (a black box).
A sophisticated threat that combines the
features of a virus, worm, Trojan horse,
blended threat
and other malicious code into a single
payload.
An agreed-upon sets of skills and abili-
ties that all licensed professionals must body of knowledge
possess.
A large group of computers, which are
controlled from one or more remote loca-
botnet
tions by hackers, without the knowledge
or consent of their owners.
The failure of one party to meet the terms
breach of contract
of a contract.
The failure to act as a reasonable person
breach of the duty of care
would act.
When a product fails to meet the terms
breach of warranty
of its warranty.
The act of providing money, property, or
favors to someone in business or gov-
bribery
ernment in order to obtain a business
advantage.
A business policy that permits, and
in some cases, encourages employ-
ees to use their own mobile devices