WGU D333 Ethics in Technology – WGU | STUDY GUIDE
A document that stipulates restrictions and practices that a user
acceptable use policy (AUP)
must agree in order to use organizational computing and
network resources.
When an organization decides to accept a risk because the cost of
avoiding the risk outweighs the potential loss of the risk. A decision
to accept a risk can be extremely difficult and controversial when
dealing with safety-critical systems because making that
acceptance determination involves forming personal judgments about the
value of human life, assessing potential liability in case of an
accident, evaluating the potential impact on the surrounding
natural environment, and estimating the system's costs and
benefits.
A network attack in which an intruder gains access to a network
advanced persistent threat (APT) and stays there— undetected—with the intention of stealing data
over a long period of time (weeks or even months).
A software development
methodology in which a system is
developed in iterations lasting from one
to four weeks. Unlike the waterfall
agile development system development model, agile
development accepts the fact that
system requirements are evolving and
cannot be fully understood or defined
at the start of the project.
An agreement of the World Trade Organization that requires
Agreement on Trade-Related
member governments to ensure that intellectual property rights
Aspects of Intellectual Property
can be enforced under their laws and that penalties for
Rights (TRIPS)
infringement are tough enough to deter further violations.
A wide-ranging act that authorized $787 billion in spending and
tax cuts over a 10- year period and included strong privacy
American Recovery and provisions for electronic health records, such as banning the
Reinvestment Act sale of health information, promoting the use of audit trails and
encryption, and providing rights of access for patients.
, The estimated loss from a potential risk event over the course of a
year. The following equation is used to calculate the annual loss
expectancy: ARO × SLE = ALE. Where ARO is the annualized rate
annualized loss expectancy (ALE)
of occurrence, an estimate of the probability that this event will
occur over the course of a year and SLE is the single loss
expectancy, the estimated loss that would be incurred if the
event happens.
annualized rate of occurrence (ARO) An estimate of the probability that a risk event will occur over the course of a
year.
anonymous expression The expression of opinions by people who do not reveal their identity.
A service that allows anonymity on the Internet by using a
anonymous remailer service computer program that strips the originating header and/or IP
address from the message and then forwards the message to its
intended recipient.
Laws designed to reduce frivolous SLAPPs (strategic lawsuit
against public participation (SLAPP), which is a lawsuit filed by
anti-SLAPP laws corporations, government officials, and others against citizens and
community groups who oppose them on matters of concern).
Software that scans for a specific sequence of bytes, known as a
antivirus software
virus signature, that indicates the presence of a specific virus.
The people, procedures, hardware, software, data, and
knowledge needed to develop computer systems and machines
that can simulate human intelligence processes, including learning
artificial intelligence systems
(the acquisition of information and rules for using the information),
reasoning (using rules to reach conclusions), and self-correction
(using the outcome from one scenario to improve its
performance on future scenarios).
A group that provides assistance to the board of directors in
fulfilling its responsibilities with respect to the oversight of the
quality and integrity of the organization's accounting and
audit committee reporting practices and controls, including financial statements
and reports; the organization's compliance with legal and
regulatory requirements; the qualifications, independence, and
performance of the company's independent auditor; and the
performance of the company's internal audit team.
The elimination of a vulnerability that gives rise to a particular risk
avoidance in order to avoid the risk altogether. This is the most effective
solution but often not possible due to organizational
requirements and factors beyond an organization's control.
The moral corruption of people in power, which is often facilitated
Bathsheba syndrome
A document that stipulates restrictions and practices that a user
acceptable use policy (AUP)
must agree in order to use organizational computing and
network resources.
When an organization decides to accept a risk because the cost of
avoiding the risk outweighs the potential loss of the risk. A decision
to accept a risk can be extremely difficult and controversial when
dealing with safety-critical systems because making that
acceptance determination involves forming personal judgments about the
value of human life, assessing potential liability in case of an
accident, evaluating the potential impact on the surrounding
natural environment, and estimating the system's costs and
benefits.
A network attack in which an intruder gains access to a network
advanced persistent threat (APT) and stays there— undetected—with the intention of stealing data
over a long period of time (weeks or even months).
A software development
methodology in which a system is
developed in iterations lasting from one
to four weeks. Unlike the waterfall
agile development system development model, agile
development accepts the fact that
system requirements are evolving and
cannot be fully understood or defined
at the start of the project.
An agreement of the World Trade Organization that requires
Agreement on Trade-Related
member governments to ensure that intellectual property rights
Aspects of Intellectual Property
can be enforced under their laws and that penalties for
Rights (TRIPS)
infringement are tough enough to deter further violations.
A wide-ranging act that authorized $787 billion in spending and
tax cuts over a 10- year period and included strong privacy
American Recovery and provisions for electronic health records, such as banning the
Reinvestment Act sale of health information, promoting the use of audit trails and
encryption, and providing rights of access for patients.
, The estimated loss from a potential risk event over the course of a
year. The following equation is used to calculate the annual loss
expectancy: ARO × SLE = ALE. Where ARO is the annualized rate
annualized loss expectancy (ALE)
of occurrence, an estimate of the probability that this event will
occur over the course of a year and SLE is the single loss
expectancy, the estimated loss that would be incurred if the
event happens.
annualized rate of occurrence (ARO) An estimate of the probability that a risk event will occur over the course of a
year.
anonymous expression The expression of opinions by people who do not reveal their identity.
A service that allows anonymity on the Internet by using a
anonymous remailer service computer program that strips the originating header and/or IP
address from the message and then forwards the message to its
intended recipient.
Laws designed to reduce frivolous SLAPPs (strategic lawsuit
against public participation (SLAPP), which is a lawsuit filed by
anti-SLAPP laws corporations, government officials, and others against citizens and
community groups who oppose them on matters of concern).
Software that scans for a specific sequence of bytes, known as a
antivirus software
virus signature, that indicates the presence of a specific virus.
The people, procedures, hardware, software, data, and
knowledge needed to develop computer systems and machines
that can simulate human intelligence processes, including learning
artificial intelligence systems
(the acquisition of information and rules for using the information),
reasoning (using rules to reach conclusions), and self-correction
(using the outcome from one scenario to improve its
performance on future scenarios).
A group that provides assistance to the board of directors in
fulfilling its responsibilities with respect to the oversight of the
quality and integrity of the organization's accounting and
audit committee reporting practices and controls, including financial statements
and reports; the organization's compliance with legal and
regulatory requirements; the qualifications, independence, and
performance of the company's independent auditor; and the
performance of the company's internal audit team.
The elimination of a vulnerability that gives rise to a particular risk
avoidance in order to avoid the risk altogether. This is the most effective
solution but often not possible due to organizational
requirements and factors beyond an organization's control.
The moral corruption of people in power, which is often facilitated
Bathsheba syndrome