100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
IDSC 3001 FINAL Questions And Answers With Verified Updates €7,61   In winkelwagen

Tentamen (uitwerkingen)

IDSC 3001 FINAL Questions And Answers With Verified Updates

 2 keer bekeken  0 keer verkocht
  • Vak
  • IDSC 3001
  • Instelling
  • IDSC 3001

Reasons IT Projects Fail - -They fail b/c they are just plain hard -They fail at the beginning due to lack or sufficient planning, assessing, or estimating -They fail b/c they are rushed -They fail b/c their scope is too unwieldy or unmanageable Worms - A more dangerous evolution of viruses, wo...

[Meer zien]

Voorbeeld 3 van de 20  pagina's

  • 25 augustus 2024
  • 20
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • IDSC 3001
  • IDSC 3001
avatar-seller
IDSC 3001 FINAL
Reasons IT Projects Fail - -They fail b/c they are just plain hard

-They fail at the beginning due to lack or sufficient planning, assessing, or estimating

-They fail b/c they are rushed

-They fail b/c their scope is too unwieldy or unmanageable



Worms - A more dangerous evolution of viruses, worms are self-propagating (meaning they do
not need any intervention from the victim, such as clicking on infected software attached to an email)



Opt-In - unless data subjects have given an expressed permission to use their data, it

must be assumed that there is no consent for that use



Stockholder Theory - managers are agents of the stockholders, and their only ethical responsibility
is to increase the profits of the business without violating the law or engaging in fraudulent practices

· Everyone who has stake in the company should be considered when making decisions

· Customers, employees, stakeholders, executives, managers

· Respect all rights of each stakeholders, and give equal considerations to the legitimate interests of all
stakeholders and adapt corporate policies that produce the optimal balance among them



Information Ethics - ethical issues associated with the development and application of information
technologies



Stakeholder Theory - A theory that holds that social responsibility is paying attention to the
interest of every affected stakeholder in every aspect of a firm's operation

· Anyone but the stockholder is a means to an end of profitability

· Executives can only spend funds in ways that have been approved by the stakeholders

· Through legal and ethical means, and with a long-term orientation

· Pursuing profits also promotes the interests of society

,Collection and Storage of Personal Data - Data collected should only be what is necessary, should
be explained all uses of it, and there should be options for how much is collected



Secondary Data Use - 1. privacy policies need to outline how else the company uses data; should
adhere to any policies that are put in place; and should not stray from strictly "affiliate sharing"



Data Accuracy - the extent to which data are free of identifiable errors; data are correct (quality
characteristic)

Some cases like the Fair Credit Reporting Act (FCRA) allow data subjects to sue

a credit bureau for damages if the bureau has been notified repeatedly about

errors but has not taken steps to correct



Authorized Access - a) Need technical controls to allow restricted access to sensitive information

b) Create politics on a "need to know" basis and consider physical blocking

devices in clicks



Automated Judgement - a) Rise of expert systems (AI) in decision making

b) ex. College students and credit cards by major



Data Mining and Profiling - ex. Combination of data between online ads and mail ads. Over
generalization



Opt-Out - unless data subjects register an overt objection, it is assumed that the

additional use of the data is acceptable



Computer Virus - software that is capable of executing an unwanted action on the victim's
computer and has a mechanism for replicating itself inside other computers that come in contact with
the infected machine



Rootkit - Computer software that hides the presence and activity of intruders

, -Used in combo with trojan software, hackers can change system settings and use the computer without
the user or monitoring software detecting it



Trojan Horse - -It claims to do one thing or nothing harmful but instead does damage when you
run it

-Can be controlled remotely by hackers to extract passwords and other sensitive info

-Can also be used to create zombie, for forwarding advertising spam, phishing emails and Trojan
software to millions of other companies on the internet



Phishing - Software that tricks internet users into divulging their personal info for use or resale by
criminals who can profit from the info (Eg. fake emails and websites that look like real and from
legitimate sources)



Computer Intrusion/Hacking - Unauthorized access to a computer system, whether it be a manual
such as using a stolen password or automated through software to bypass network security protection
via the Internet



Denial-of-Service Attack - Inundating a computer, router or other networked device with more
packets of data than it can process, effectively blocking any legitimate requests to access the system



Botnets - Networked groups of compromised computers or zombies that are controlled by
hackers, usually through Trojan software to deliver spam, phishing, and DoS attacks



Man-in-the-Middle Attack - -Criminals create bogus sites that are capable of communicating
directly with legitimate sites in real time

-Victims access their actual accounts online or using hardware token, but do it through the man-in-the-
middle servers that capture all their information

-These servers can even force the legitimate site to keep secure sessions open after the victim has logged
off , allowing criminals to access the account and withdraw money



Social Engineering - In the context of information security, refers to psychological manipulation of
people into performing actions r divulging confidential information

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper ACADEMICMATERIALS. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,61. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 82977 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€7,61
  • (0)
  Kopen