BCOR 2205 Quiz 2 Questions and Answers with complete solution
ethics - the principles and standards that guide our behavior toward other people information ethics - Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself privacy - (major ethical issue) the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality - the assurance that messages and information are available only to those who are authorized to view them intellectual property - intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents Copyright - the legal protection afforded an expression of an idea, such as a song, book, or video game, and some types of proprietary documents patent - is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor pirated software - the unauthorized use, duplication, distribution, or sale of copyrighted software counterfeit software - software that is manufactured to look like the real thing and sold as such data/web scraping - the process of importing information from a website into a spreadsheet or local file saved on a computerclick-fraud - the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser digital trust - is the measure of consumer, partner, and employee confidence in an organizations ability to protect and secure data and the privacy of individuals information privacy policy - contains general principles regarding information privacy fair information practices (FIPs) - general term for a set of standard governing the collection and use of personal data for addressing issues of privacy and accuracy acceptable use policy - Requires a user to agree to it before they are provided access Either email, information systems, or an online platform) Cybervandalism - electronically deface the website typosquatt - register with purposely misspelled variations of well known domain names email privacy policy - details the extent to which email messages may be read by others social media policy - Outlines the corporate guidelines or principles governing employee online communications Rule 41: Search and Seizure - -allows a federal judge magistrate to issue a warrant that allows an investigator to gain remote access to a digital device suspected in a crime even if its outside the geographical region -VPM the general data protection regulation (GDPR) - Proposed set of regulations adopted by the European Union to protect Internet users from clandestine tracking and unauthorized personal data usage.-most expensive and expansive data/privacy protection penalty for violation organizational information is... - intellectual capital - it must be protected Information Security - The protection of information from accidental or intentional misuse by persons inside or outside an organization Cybersecurity - involves prevention, detection, and response to cyber attacks that can have wideranging effects on the individual, organizations, community, and at the national level downtime - Refers to a period of time when a system is unavailable CISA duties - responsible for protecting the nation critical infrastructure from physical and cyber threats comprehensive cyber protection - 24/7 cyber situational awareness, analysis, incident response, and cyber defense capabilities to the federal, state, local, tribal, and territorial governments, the private sector, and International partners infrastructure resilience - coordinates security and resilience efforts and delivers training, technical assistance, and assessments. Provides all-hazards risk analyses for US critical infrastructure emergency communications - CISA conducts extensive outreach to support and promote the ability of emergency response providers and relevant government officials to continue to communicate in the event of natural disasters and acts of terrorism black-hat hackers - break into other people's computer systems and may just look around or may steal and destroy information crackers - have criminal intent when hackingcyberterrorists - seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction Hactivists - have philosophical and political reasons for breaking into systems and will often deface the website as a protest Script kiddies or script bunnies - find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses white-hat hackers - work at the request of the system owners to find system vulnerabilities and plug the holes Bug Bounty Program - a crowdsourcing program initiative that rewards individuals for discovering and reporting software bugs virus - software written with malicious intent to cause annoyance or damage worm - a type of virus that spreads itself, not only from file to file, but also from computer to computer Malware - software that is intended to damage or disable computers and computer systems. adware - software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user spyware - a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission ransomware - a form of malicious software that infects your computer and asks for money
Geschreven voor
- Instelling
- BCOR 2205
- Vak
- BCOR 2205
Documentinformatie
- Geüpload op
- 15 april 2024
- Aantal pagina's
- 12
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
bcor 2205
Ook beschikbaar in voordeelbundel