100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

BCOR 2205 Quiz 2 Questions and Answers with complete solution

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
15-04-2024
Written in
2023/2024

ethics - the principles and standards that guide our behavior toward other people information ethics - Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself privacy - (major ethical issue) the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality - the assurance that messages and information are available only to those who are authorized to view them intellectual property - intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents Copyright - the legal protection afforded an expression of an idea, such as a song, book, or video game, and some types of proprietary documents patent - is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor pirated software - the unauthorized use, duplication, distribution, or sale of copyrighted software counterfeit software - software that is manufactured to look like the real thing and sold as such data/web scraping - the process of importing information from a website into a spreadsheet or local file saved on a computerclick-fraud - the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser digital trust - is the measure of consumer, partner, and employee confidence in an organizations ability to protect and secure data and the privacy of individuals information privacy policy - contains general principles regarding information privacy fair information practices (FIPs) - general term for a set of standard governing the collection and use of personal data for addressing issues of privacy and accuracy acceptable use policy - Requires a user to agree to it before they are provided access Either email, information systems, or an online platform) Cybervandalism - electronically deface the website typosquatt - register with purposely misspelled variations of well known domain names email privacy policy - details the extent to which email messages may be read by others social media policy - Outlines the corporate guidelines or principles governing employee online communications Rule 41: Search and Seizure - -allows a federal judge magistrate to issue a warrant that allows an investigator to gain remote access to a digital device suspected in a crime even if its outside the geographical region -VPM the general data protection regulation (GDPR) - Proposed set of regulations adopted by the European Union to protect Internet users from clandestine tracking and unauthorized personal data usage.-most expensive and expansive data/privacy protection penalty for violation organizational information is... - intellectual capital - it must be protected Information Security - The protection of information from accidental or intentional misuse by persons inside or outside an organization Cybersecurity - involves prevention, detection, and response to cyber attacks that can have wideranging effects on the individual, organizations, community, and at the national level downtime - Refers to a period of time when a system is unavailable CISA duties - responsible for protecting the nation critical infrastructure from physical and cyber threats comprehensive cyber protection - 24/7 cyber situational awareness, analysis, incident response, and cyber defense capabilities to the federal, state, local, tribal, and territorial governments, the private sector, and International partners infrastructure resilience - coordinates security and resilience efforts and delivers training, technical assistance, and assessments. Provides all-hazards risk analyses for US critical infrastructure emergency communications - CISA conducts extensive outreach to support and promote the ability of emergency response providers and relevant government officials to continue to communicate in the event of natural disasters and acts of terrorism black-hat hackers - break into other people's computer systems and may just look around or may steal and destroy information crackers - have criminal intent when hackingcyberterrorists - seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction Hactivists - have philosophical and political reasons for breaking into systems and will often deface the website as a protest Script kiddies or script bunnies - find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses white-hat hackers - work at the request of the system owners to find system vulnerabilities and plug the holes Bug Bounty Program - a crowdsourcing program initiative that rewards individuals for discovering and reporting software bugs virus - software written with malicious intent to cause annoyance or damage worm - a type of virus that spreads itself, not only from file to file, but also from computer to computer Malware - software that is intended to damage or disable computers and computer systems. adware - software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user spyware - a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission ransomware - a form of malicious software that infects your computer and asks for money

Show more Read less
Institution
BCOR 2205
Course
BCOR 2205









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
BCOR 2205
Course
BCOR 2205

Document information

Uploaded on
April 15, 2024
Number of pages
12
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICMATERIALS City University New York
View profile
Follow You need to be logged in order to follow users or courses
Sold
569
Member since
2 year
Number of followers
186
Documents
10590
Last sold
3 days ago

4.1

96 reviews

5
53
4
12
3
21
2
3
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions