100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor $7.99   Add to cart

Exam (elaborations)

D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor

 13 views  0 purchase
  • Course
  • CIMP - Certificate in Investment Performance Measurement
  • Institution
  • CIMP - Certificate In Investment Performance Measurement

D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral corruption of people in power, also a te...

[Show more]

Preview 2 out of 6  pages

  • August 12, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CIMP - Certificate in Investment Performance Measurement
  • CIMP - Certificate in Investment Performance Measurement
avatar-seller
Denyss
8/12/24, 11:19 AM



D333- Ethics In Technology
Jeremiah




Terms in this set (176)

vitrue a habit that inclines people to do what's acceptable

vice A habit of unacceptable behavior

Integrirty acts in accordance with personal code of principles

the moral corruption of people in power, also a tendency for people to look the other
Bathesheba Syndrome
way when leaders act inappropriately

Software & Information Industry Association trade groups that represent largest software and hardware manufactures, stop
(SIIA) & BSA unauthorized copyright, protect intellectual property, provides education

Misrepresentation A false statement or lie that can render the contract void.

breach of contract A failure to perform, as promised, at the time the performance was due.

Organization's internal control all people, policies, processes, procedures, & systems controlled by management

makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on any
US stock exchange

body of knowledge An agreed-upon sets of skills and abilities that all licensed professionals must possess.

develops, administers, and scores the examinations used for engineering and survey
National Council of Examiners & Surveying
licensure in the US

not doing something a reasonable person would do/ something a reasonable person
Negligence
would not do

the obligation people owe each other not to cause any unreasonable harm or risk of
Duty of Care
harm

A legal standard that defendants who have particular expertise or competence are
Reasonable Professional Standard
measured against.

A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.

Professional Malpractice break of duty of care by a professional

A cyberattack that takes place before the security community and/or software
Zero-Day Exploit




developers become aware of and fix a security vulnerability.



1/6

, 8/12/24, 11:19 AM
someone who violates computer or internet security maliciously or for illegal personal
Black Hat Hacker
gain

An employee or contractor who attempts to gain financially and/or disrupt a company's
Malicious Insider
information systems and business operations

Cybercriminal Someone who attacks a computer system or network for financial gain

Someone who attempts to destroy the infrastructure components of governments,
Cyberterrorist
financial institutions, utilities, and emergency response units

Cracker An individual who causes problems, steals data, and corrupts systems

Ransomware malware until you meet certain demands

A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.

a harmful program that resides in the active memory of the computer and duplicates
Worm
itself

Trojan Horse A seemingly harmless program in which malicious code is hidden.

Blended Threat combines various types of exploits and vulnerabilities in one payload

a malicious hacker takes over computers via the internet and causes them to flood a
DDoS Attack/ Denial of Service Attack
target site with demands for data/small tasks

A set of programs that enables its user to gain administrator level access to a computer
Rootkit
without the end user's consent or knowledge.

APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.

Spear Phishing Fraudulent emails to a certain organizations employees.

Smishing Phishing attacks committed using text messages (SMS).

Large federal agency with a budget of almost $65 billion whose goal is to provide a
Department of Homeland Security DHS
more safer, more secure America, which is resistant to terrorism and potential threats

Address fraud and related activities in association with computers including access.
Computer Fraud and Abuse Act (CFAA) 1986
transmission, password trafficking, and threats/

Fraud and Related Activity in Connection Covers dales claims regarding unauthorized use of credit cards
with Access Devices Statute

Stored Wire and Electronic Communications Focuses on unlawful access to stored communications to obtain, alter, or prevent
and Transactional Records Access Statutes unauthorized access to electronic communication while it is in electrical storage.
(U.S. Code Title 18, Chapter 121)

Defines cyberterrorism and associated penalties. Gave new powers to domestic law
enforcement and international intelligence agencies. Increasing the ability of law
USA Patriot Act 2001
enforcement agencies to search all kinds of records. It also eased restrictions on
foreign intelligence gathering in the US.

The recognition that managers must use their judgment to ensure that the cost of
Reasonable Assurance
control does not exceed the system's benefits or the risks involved.

Guidelines and arrangements for response to disruption of critical business functions,
Business Continuity Plan
to restore and maintain operation.

requires financial institutions in the United States to assist U.S. government agencies to
Bank Secrecy Act 1970
detect and prevent money laundering.

Makes certain payments to foreign officials and other foreign persons illegal and
Foreign Corruption Practices Act 1977
requires companies to maintain accurate records


D333- Ethics In Technology
2/6

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart