D333- Ethics In Technology
5.0 (1 review)
Save
Students also studied
Flashcard sets Study guides Practice tests
WGU D333 Ethics in Technology - W... D333 Ethics in Technology BA 300 Se
332 terms 169 terms 31 terms 45
Drkintrudr Preview blove871 Preview wesley_361 Preview
Practice questions for this set
Learn 1 /7 Study with Learn
a habit that inclines people to do what's acceptable
Give this one a try later!
1 justice 2 blended threat
vitrue 4 smishing
Don't know?
Terms in this set (176)
vitrue a habit that inclines people to do what's acceptable
vice A habit of unacceptable behavior
Integrirty acts in accordance with personal code of principles
the moral corruption of people in power, also a tendency for people to look the
Bathesheba Syndrome
other way when leaders act inappropriately
Software & Information Industry trade groups that represent largest software and hardware manufactures, stop
Association (SIIA) & BSA unauthorized copyright, protect intellectual property, provides education
Misrepresentation A false statement or lie that can render the contract void.
, breach of contract A failure to perform, as promised, at the time the performance was due.
Organization's internal control all people, policies, processes, procedures, & systems controlled by management
makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on
any US stock exchange
An agreed-upon sets of skills and abilities that all licensed professionals must
body of knowledge
possess.
National Council of Examiners & develops, administers, and scores the examinations used for engineering and
Surveying survey licensure in the US
not doing something a reasonable person would do/ something a reasonable
Negligence
person would not do
the obligation people owe each other not to cause any unreasonable harm or risk
Duty of Care
of harm
A legal standard that defendants who have particular expertise or competence
Reasonable Professional Standard
are measured against.
A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.
Professional Malpractice break of duty of care by a professional
A cyberattack that takes place before the security community and/or software
Zero-Day Exploit
developers become aware of and fix a security vulnerability.
someone who violates computer or internet security maliciously or for illegal
Black Hat Hacker
personal gain
An employee or contractor who attempts to gain financially and/or disrupt a
Malicious Insider
company's information systems and business operations
Cybercriminal Someone who attacks a computer system or network for financial gain
Someone who attempts to destroy the infrastructure components of
Cyberterrorist
governments, financial institutions, utilities, and emergency response units
Cracker An individual who causes problems, steals data, and corrupts systems
Ransomware malware until you meet certain demands
A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.
a harmful program that resides in the active memory of the computer and
Worm
duplicates itself
Trojan Horse A seemingly harmless program in which malicious code is hidden.
Blended Threat combines various types of exploits and vulnerabilities in one payload
a malicious hacker takes over computers via the internet and causes them to flood
DDoS Attack/ Denial of Service Attack
a target site with demands for data/small tasks
A set of programs that enables its user to gain administrator level access to a
Rootkit
computer without the end user's consent or knowledge.
APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.
Spear Phishing Fraudulent emails to a certain organizations employees.
Smishing Phishing attacks committed using text messages (SMS).
Large federal agency with a budget of almost $65 billion whose goal is to provide
Department of Homeland Security DHS a more safer, more secure America, which is resistant to terrorism and potential
threats
Computer Fraud and Abuse Act (CFAA) Address fraud and related activities in association with computers including
1986 access. transmission, password trafficking, and threats/
5.0 (1 review)
Save
Students also studied
Flashcard sets Study guides Practice tests
WGU D333 Ethics in Technology - W... D333 Ethics in Technology BA 300 Se
332 terms 169 terms 31 terms 45
Drkintrudr Preview blove871 Preview wesley_361 Preview
Practice questions for this set
Learn 1 /7 Study with Learn
a habit that inclines people to do what's acceptable
Give this one a try later!
1 justice 2 blended threat
vitrue 4 smishing
Don't know?
Terms in this set (176)
vitrue a habit that inclines people to do what's acceptable
vice A habit of unacceptable behavior
Integrirty acts in accordance with personal code of principles
the moral corruption of people in power, also a tendency for people to look the
Bathesheba Syndrome
other way when leaders act inappropriately
Software & Information Industry trade groups that represent largest software and hardware manufactures, stop
Association (SIIA) & BSA unauthorized copyright, protect intellectual property, provides education
Misrepresentation A false statement or lie that can render the contract void.
, breach of contract A failure to perform, as promised, at the time the performance was due.
Organization's internal control all people, policies, processes, procedures, & systems controlled by management
makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on
any US stock exchange
An agreed-upon sets of skills and abilities that all licensed professionals must
body of knowledge
possess.
National Council of Examiners & develops, administers, and scores the examinations used for engineering and
Surveying survey licensure in the US
not doing something a reasonable person would do/ something a reasonable
Negligence
person would not do
the obligation people owe each other not to cause any unreasonable harm or risk
Duty of Care
of harm
A legal standard that defendants who have particular expertise or competence
Reasonable Professional Standard
are measured against.
A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.
Professional Malpractice break of duty of care by a professional
A cyberattack that takes place before the security community and/or software
Zero-Day Exploit
developers become aware of and fix a security vulnerability.
someone who violates computer or internet security maliciously or for illegal
Black Hat Hacker
personal gain
An employee or contractor who attempts to gain financially and/or disrupt a
Malicious Insider
company's information systems and business operations
Cybercriminal Someone who attacks a computer system or network for financial gain
Someone who attempts to destroy the infrastructure components of
Cyberterrorist
governments, financial institutions, utilities, and emergency response units
Cracker An individual who causes problems, steals data, and corrupts systems
Ransomware malware until you meet certain demands
A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.
a harmful program that resides in the active memory of the computer and
Worm
duplicates itself
Trojan Horse A seemingly harmless program in which malicious code is hidden.
Blended Threat combines various types of exploits and vulnerabilities in one payload
a malicious hacker takes over computers via the internet and causes them to flood
DDoS Attack/ Denial of Service Attack
a target site with demands for data/small tasks
A set of programs that enables its user to gain administrator level access to a
Rootkit
computer without the end user's consent or knowledge.
APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.
Spear Phishing Fraudulent emails to a certain organizations employees.
Smishing Phishing attacks committed using text messages (SMS).
Large federal agency with a budget of almost $65 billion whose goal is to provide
Department of Homeland Security DHS a more safer, more secure America, which is resistant to terrorism and potential
threats
Computer Fraud and Abuse Act (CFAA) Address fraud and related activities in association with computers including
1986 access. transmission, password trafficking, and threats/