Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
Recherché précédemment par vous
D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor€7,59
Ajouter au panier
CIMP - Certificate In Investment Performance Measurement
CIMP - Certificate in Investment Performance Measurement
Examen
D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor
13 vues 0 fois vendu
Cours
CIMP - Certificate in Investment Performance Measurement
Établissement
CIMP - Certificate In Investment Performance Measurement
D333- Ethics In Technology
Terms in this set (176)
vitrue a habit that inclines people to do what's acceptable
vice A habit of unacceptable behavior
Integrirty acts in accordance with personal code of principles
Bathesheba Syndrome the moral corruption of people in power, also a te...
CIMP - Certificate in Investment Performance Measurement
CIMP - Certificate in Investment Performance Measurement
Vendeur
S'abonner
Denyss
Aperçu du contenu
8/12/24, 11:19 AM
D333- Ethics In Technology
Jeremiah
Terms in this set (176)
vitrue a habit that inclines people to do what's acceptable
vice A habit of unacceptable behavior
Integrirty acts in accordance with personal code of principles
the moral corruption of people in power, also a tendency for people to look the other
Bathesheba Syndrome
way when leaders act inappropriately
Software & Information Industry Association trade groups that represent largest software and hardware manufactures, stop
(SIIA) & BSA unauthorized copyright, protect intellectual property, provides education
Misrepresentation A false statement or lie that can render the contract void.
breach of contract A failure to perform, as promised, at the time the performance was due.
Organization's internal control all people, policies, processes, procedures, & systems controlled by management
makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on any
US stock exchange
body of knowledge An agreed-upon sets of skills and abilities that all licensed professionals must possess.
develops, administers, and scores the examinations used for engineering and survey
National Council of Examiners & Surveying
licensure in the US
not doing something a reasonable person would do/ something a reasonable person
Negligence
would not do
the obligation people owe each other not to cause any unreasonable harm or risk of
Duty of Care
harm
A legal standard that defendants who have particular expertise or competence are
Reasonable Professional Standard
measured against.
A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.
Professional Malpractice break of duty of care by a professional
A cyberattack that takes place before the security community and/or software
Zero-Day Exploit
developers become aware of and fix a security vulnerability.
1/6
, 8/12/24, 11:19 AM
someone who violates computer or internet security maliciously or for illegal personal
Black Hat Hacker
gain
An employee or contractor who attempts to gain financially and/or disrupt a company's
Malicious Insider
information systems and business operations
Cybercriminal Someone who attacks a computer system or network for financial gain
Someone who attempts to destroy the infrastructure components of governments,
Cyberterrorist
financial institutions, utilities, and emergency response units
Cracker An individual who causes problems, steals data, and corrupts systems
Ransomware malware until you meet certain demands
A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.
a harmful program that resides in the active memory of the computer and duplicates
Worm
itself
Trojan Horse A seemingly harmless program in which malicious code is hidden.
Blended Threat combines various types of exploits and vulnerabilities in one payload
a malicious hacker takes over computers via the internet and causes them to flood a
DDoS Attack/ Denial of Service Attack
target site with demands for data/small tasks
A set of programs that enables its user to gain administrator level access to a computer
Rootkit
without the end user's consent or knowledge.
APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.
Spear Phishing Fraudulent emails to a certain organizations employees.
Smishing Phishing attacks committed using text messages (SMS).
Large federal agency with a budget of almost $65 billion whose goal is to provide a
Department of Homeland Security DHS
more safer, more secure America, which is resistant to terrorism and potential threats
Address fraud and related activities in association with computers including access.
Computer Fraud and Abuse Act (CFAA) 1986
transmission, password trafficking, and threats/
Fraud and Related Activity in Connection Covers dales claims regarding unauthorized use of credit cards
with Access Devices Statute
Stored Wire and Electronic Communications Focuses on unlawful access to stored communications to obtain, alter, or prevent
and Transactional Records Access Statutes unauthorized access to electronic communication while it is in electrical storage.
(U.S. Code Title 18, Chapter 121)
Defines cyberterrorism and associated penalties. Gave new powers to domestic law
enforcement and international intelligence agencies. Increasing the ability of law
USA Patriot Act 2001
enforcement agencies to search all kinds of records. It also eased restrictions on
foreign intelligence gathering in the US.
The recognition that managers must use their judgment to ensure that the cost of
Reasonable Assurance
control does not exceed the system's benefits or the risks involved.
Guidelines and arrangements for response to disruption of critical business functions,
Business Continuity Plan
to restore and maintain operation.
requires financial institutions in the United States to assist U.S. government agencies to
Bank Secrecy Act 1970
detect and prevent money laundering.
Makes certain payments to foreign officials and other foreign persons illegal and
Foreign Corruption Practices Act 1977
requires companies to maintain accurate records
D333- Ethics In Technology
2/6
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur Denyss. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €7,59. Vous n'êtes lié à rien après votre achat.