100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IDSC 3001 FINAL Questions And Answers With Verified Updates $7.99   Add to cart

Exam (elaborations)

IDSC 3001 FINAL Questions And Answers With Verified Updates

 2 views  0 purchase
  • Course
  • IDSC 3001
  • Institution
  • IDSC 3001

Reasons IT Projects Fail - -They fail b/c they are just plain hard -They fail at the beginning due to lack or sufficient planning, assessing, or estimating -They fail b/c they are rushed -They fail b/c their scope is too unwieldy or unmanageable Worms - A more dangerous evolution of viruses, wo...

[Show more]

Preview 3 out of 20  pages

  • August 25, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • IDSC 3001
  • IDSC 3001
avatar-seller
ACADEMICMATERIALS
IDSC 3001 FINAL
Reasons IT Projects Fail - -They fail b/c they are just plain hard

-They fail at the beginning due to lack or sufficient planning, assessing, or estimating

-They fail b/c they are rushed

-They fail b/c their scope is too unwieldy or unmanageable



Worms - A more dangerous evolution of viruses, worms are self-propagating (meaning they do
not need any intervention from the victim, such as clicking on infected software attached to an email)



Opt-In - unless data subjects have given an expressed permission to use their data, it

must be assumed that there is no consent for that use



Stockholder Theory - managers are agents of the stockholders, and their only ethical responsibility
is to increase the profits of the business without violating the law or engaging in fraudulent practices

· Everyone who has stake in the company should be considered when making decisions

· Customers, employees, stakeholders, executives, managers

· Respect all rights of each stakeholders, and give equal considerations to the legitimate interests of all
stakeholders and adapt corporate policies that produce the optimal balance among them



Information Ethics - ethical issues associated with the development and application of information
technologies



Stakeholder Theory - A theory that holds that social responsibility is paying attention to the
interest of every affected stakeholder in every aspect of a firm's operation

· Anyone but the stockholder is a means to an end of profitability

· Executives can only spend funds in ways that have been approved by the stakeholders

· Through legal and ethical means, and with a long-term orientation

· Pursuing profits also promotes the interests of society

,Collection and Storage of Personal Data - Data collected should only be what is necessary, should
be explained all uses of it, and there should be options for how much is collected



Secondary Data Use - 1. privacy policies need to outline how else the company uses data; should
adhere to any policies that are put in place; and should not stray from strictly "affiliate sharing"



Data Accuracy - the extent to which data are free of identifiable errors; data are correct (quality
characteristic)

Some cases like the Fair Credit Reporting Act (FCRA) allow data subjects to sue

a credit bureau for damages if the bureau has been notified repeatedly about

errors but has not taken steps to correct



Authorized Access - a) Need technical controls to allow restricted access to sensitive information

b) Create politics on a "need to know" basis and consider physical blocking

devices in clicks



Automated Judgement - a) Rise of expert systems (AI) in decision making

b) ex. College students and credit cards by major



Data Mining and Profiling - ex. Combination of data between online ads and mail ads. Over
generalization



Opt-Out - unless data subjects register an overt objection, it is assumed that the

additional use of the data is acceptable



Computer Virus - software that is capable of executing an unwanted action on the victim's
computer and has a mechanism for replicating itself inside other computers that come in contact with
the infected machine



Rootkit - Computer software that hides the presence and activity of intruders

, -Used in combo with trojan software, hackers can change system settings and use the computer without
the user or monitoring software detecting it



Trojan Horse - -It claims to do one thing or nothing harmful but instead does damage when you
run it

-Can be controlled remotely by hackers to extract passwords and other sensitive info

-Can also be used to create zombie, for forwarding advertising spam, phishing emails and Trojan
software to millions of other companies on the internet



Phishing - Software that tricks internet users into divulging their personal info for use or resale by
criminals who can profit from the info (Eg. fake emails and websites that look like real and from
legitimate sources)



Computer Intrusion/Hacking - Unauthorized access to a computer system, whether it be a manual
such as using a stolen password or automated through software to bypass network security protection
via the Internet



Denial-of-Service Attack - Inundating a computer, router or other networked device with more
packets of data than it can process, effectively blocking any legitimate requests to access the system



Botnets - Networked groups of compromised computers or zombies that are controlled by
hackers, usually through Trojan software to deliver spam, phishing, and DoS attacks



Man-in-the-Middle Attack - -Criminals create bogus sites that are capable of communicating
directly with legitimate sites in real time

-Victims access their actual accounts online or using hardware token, but do it through the man-in-the-
middle servers that capture all their information

-These servers can even force the legitimate site to keep secure sessions open after the victim has logged
off , allowing criminals to access the account and withdraw money



Social Engineering - In the context of information security, refers to psychological manipulation of
people into performing actions r divulging confidential information

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICMATERIALS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart