100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor €7,73   In winkelwagen

Tentamen (uitwerkingen)

D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor

 13 keer bekeken  0 keer verkocht
  • Vak
  • CIMP - Certificate in Investment Performance Measurement
  • Instelling
  • CIMP - Certificate In Investment Performance Measurement

D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral corruption of people in power, also a te...

[Meer zien]

Voorbeeld 2 van de 6  pagina's

  • 12 augustus 2024
  • 6
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • CIMP - Certificate in Investment Performance Measurement
  • CIMP - Certificate in Investment Performance Measurement
avatar-seller
8/12/24, 11:19 AM



D333- Ethics In Technology
Jeremiah




Terms in this set (176)

vitrue a habit that inclines people to do what's acceptable

vice A habit of unacceptable behavior

Integrirty acts in accordance with personal code of principles

the moral corruption of people in power, also a tendency for people to look the other
Bathesheba Syndrome
way when leaders act inappropriately

Software & Information Industry Association trade groups that represent largest software and hardware manufactures, stop
(SIIA) & BSA unauthorized copyright, protect intellectual property, provides education

Misrepresentation A false statement or lie that can render the contract void.

breach of contract A failure to perform, as promised, at the time the performance was due.

Organization's internal control all people, policies, processes, procedures, & systems controlled by management

makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on any
US stock exchange

body of knowledge An agreed-upon sets of skills and abilities that all licensed professionals must possess.

develops, administers, and scores the examinations used for engineering and survey
National Council of Examiners & Surveying
licensure in the US

not doing something a reasonable person would do/ something a reasonable person
Negligence
would not do

the obligation people owe each other not to cause any unreasonable harm or risk of
Duty of Care
harm

A legal standard that defendants who have particular expertise or competence are
Reasonable Professional Standard
measured against.

A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.

Professional Malpractice break of duty of care by a professional

A cyberattack that takes place before the security community and/or software
Zero-Day Exploit




developers become aware of and fix a security vulnerability.



1/6

, 8/12/24, 11:19 AM
someone who violates computer or internet security maliciously or for illegal personal
Black Hat Hacker
gain

An employee or contractor who attempts to gain financially and/or disrupt a company's
Malicious Insider
information systems and business operations

Cybercriminal Someone who attacks a computer system or network for financial gain

Someone who attempts to destroy the infrastructure components of governments,
Cyberterrorist
financial institutions, utilities, and emergency response units

Cracker An individual who causes problems, steals data, and corrupts systems

Ransomware malware until you meet certain demands

A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.

a harmful program that resides in the active memory of the computer and duplicates
Worm
itself

Trojan Horse A seemingly harmless program in which malicious code is hidden.

Blended Threat combines various types of exploits and vulnerabilities in one payload

a malicious hacker takes over computers via the internet and causes them to flood a
DDoS Attack/ Denial of Service Attack
target site with demands for data/small tasks

A set of programs that enables its user to gain administrator level access to a computer
Rootkit
without the end user's consent or knowledge.

APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.

Spear Phishing Fraudulent emails to a certain organizations employees.

Smishing Phishing attacks committed using text messages (SMS).

Large federal agency with a budget of almost $65 billion whose goal is to provide a
Department of Homeland Security DHS
more safer, more secure America, which is resistant to terrorism and potential threats

Address fraud and related activities in association with computers including access.
Computer Fraud and Abuse Act (CFAA) 1986
transmission, password trafficking, and threats/

Fraud and Related Activity in Connection Covers dales claims regarding unauthorized use of credit cards
with Access Devices Statute

Stored Wire and Electronic Communications Focuses on unlawful access to stored communications to obtain, alter, or prevent
and Transactional Records Access Statutes unauthorized access to electronic communication while it is in electrical storage.
(U.S. Code Title 18, Chapter 121)

Defines cyberterrorism and associated penalties. Gave new powers to domestic law
enforcement and international intelligence agencies. Increasing the ability of law
USA Patriot Act 2001
enforcement agencies to search all kinds of records. It also eased restrictions on
foreign intelligence gathering in the US.

The recognition that managers must use their judgment to ensure that the cost of
Reasonable Assurance
control does not exceed the system's benefits or the risks involved.

Guidelines and arrangements for response to disruption of critical business functions,
Business Continuity Plan
to restore and maintain operation.

requires financial institutions in the United States to assist U.S. government agencies to
Bank Secrecy Act 1970
detect and prevent money laundering.

Makes certain payments to foreign officials and other foreign persons illegal and
Foreign Corruption Practices Act 1977
requires companies to maintain accurate records


D333- Ethics In Technology
2/6

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Denyss. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,73. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 79650 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen

Laatst bekeken door jou


€7,73
  • (0)
  Kopen