100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISQS 2340 EXAM 4 DELGADILLO Questions With Answers Graded A+ Assured Success £7.52   Add to cart

Exam (elaborations)

ISQS 2340 EXAM 4 DELGADILLO Questions With Answers Graded A+ Assured Success

 0 view  0 purchase
  • Module
  • ISQS 2340DELGADILLO
  • Institution
  • ISQS 2340DELGADILLO

Proportionality - ️️The good achieved by the technology must outweigh the harm or risk Informed Consent - ️️Those affected by the technology should understand and accept the risks Ethics - ️️-Also known as moral philosophy -A branch of philosophy that addresses questions about mora...

[Show more]

Preview 2 out of 6  pages

  • September 18, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ISQS 2340DELGADILLO
  • ISQS 2340DELGADILLO
avatar-seller
ISQS 2340 EXAM 4 DELGADILLO
Proportionality - ✔️✔️The good achieved by the technology must outweigh the harm or
risk

Informed Consent - ✔️✔️Those affected by the technology should understand and
accept the risks

Ethics - ✔️✔️-Also known as moral philosophy
-A branch of philosophy that addresses questions about morality--that is, concepts such
as good and evil, right and wrong

Justice - ✔️✔️The benefits and burdens of the technology should be distributed fairly

Minimized Risk - ✔️✔️Even if judged acceptable by the other three guidelines, the
technology must be implemented so as to avoid all unnecessary risk

Business Professionals (Ethical Responsibility) - ✔️✔️-Have a responsibility to promote
ethical uses of information technology in the workplace

Computer Crime - ✔️✔️-The unauthorized use, access, modification, and destruction
of hardware, software, data, or network resources
-The unauthorized release of information
-Using or conspiring to use computer or network resources illegally to obtain information
or tangible property

Sniffer - ✔️✔️Programs that search individual packets of data as they pass through the
internet

Hacking - ✔️✔️The forced access and use of networked computer systems

Spoofing - ✔️✔️Faking an email address to trick users into passing along critical
information like passwords or credit card numbers

Phishing - ✔️✔️-An attempt to trick a person into giving away their private account
information by confirming it at the phisher's website.

-Spoofed emails are sent to a randomly chosen group of perspective victims with hope
that a portion will be received by actual customers.

Denial of Service Attack - ✔️✔️Hammering a website's equipment with too many
requests for information

, Scans - ✔️✔️Widespread probes of the internet to determine types of computers,
services, and connections.

Trojan Horse - ✔️✔️-A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software.

-Unlike viruses, they cannot replicate. They need to be invited usually when a user
opens an email attachment.

Malicious Applets - ✔️✔️Tiny Java programs that misuse your computer's resources,
modify files on the hard disk, send fake emails, or steal passwords.

Back Doors - ✔️✔️A hidden point of entry to be used in case the original point of entry
had been detected or blocked.

Dumpster Diving - ✔️✔️Sifting through a companies garbage to find their information to
help break into their computers.

Keystroke Logging - ✔️✔️Technique embedded in some program that enables the
recording and reporting of a user's keystrokes.

Logic Bomb - ✔️✔️An instruction in a computer program that triggers a malicious act.

Buffer Overflow - ✔️✔️A technique for crashing by sending too much data in a
computer's memory

Cyber Theft - ✔️✔️Computer crime involving the theft of money.

Password Crackers - ✔️✔️Software that can guess passwords

Social Engineering - ✔️✔️Gaining access to a computer system by talking
unsuspecting company employees out of valuable information such as passwords.

Spamming - ✔️✔️Indiscriminate sending of unsolicited email messages to many
internet users (junk mail)

Flaming - ✔️✔️-Sending extremely critical, derogatory, and often vulgar email
messages or newsgroup postings to other users on the internet or online services
(Flame Mail)

Internet Abuses in the Workplace - ✔️✔️-General email abuses

-Copyright infringement

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £7.52. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73243 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling

Recently viewed by you


£7.52
  • (0)
  Add to cart