IDSC 3001 FINAL Questions And Answers With Verified Updates
2 keer bekeken 0 keer verkocht
Vak
IDSC 3001
Instelling
IDSC 3001
Reasons IT Projects Fail - -They fail b/c they are just plain hard
-They fail at the beginning due to lack or sufficient planning, assessing, or estimating
-They fail b/c they are rushed
-They fail b/c their scope is too unwieldy or unmanageable
Worms - A more dangerous evolution of viruses, wo...
IDSC 3001 FINAL
Reasons IT Projects Fail - -They fail b/c they are just plain hard
-They fail at the beginning due to lack or sufficient planning, assessing, or estimating
-They fail b/c they are rushed
-They fail b/c their scope is too unwieldy or unmanageable
Worms - A more dangerous evolution of viruses, worms are self-propagating (meaning they do
not need any intervention from the victim, such as clicking on infected software attached to an email)
Opt-In - unless data subjects have given an expressed permission to use their data, it
must be assumed that there is no consent for that use
Stockholder Theory - managers are agents of the stockholders, and their only ethical responsibility
is to increase the profits of the business without violating the law or engaging in fraudulent practices
· Everyone who has stake in the company should be considered when making decisions
· Respect all rights of each stakeholders, and give equal considerations to the legitimate interests of all
stakeholders and adapt corporate policies that produce the optimal balance among them
Information Ethics - ethical issues associated with the development and application of information
technologies
Stakeholder Theory - A theory that holds that social responsibility is paying attention to the
interest of every affected stakeholder in every aspect of a firm's operation
· Anyone but the stockholder is a means to an end of profitability
· Executives can only spend funds in ways that have been approved by the stakeholders
· Through legal and ethical means, and with a long-term orientation
· Pursuing profits also promotes the interests of society
,Collection and Storage of Personal Data - Data collected should only be what is necessary, should
be explained all uses of it, and there should be options for how much is collected
Secondary Data Use - 1. privacy policies need to outline how else the company uses data; should
adhere to any policies that are put in place; and should not stray from strictly "affiliate sharing"
Data Accuracy - the extent to which data are free of identifiable errors; data are correct (quality
characteristic)
Some cases like the Fair Credit Reporting Act (FCRA) allow data subjects to sue
a credit bureau for damages if the bureau has been notified repeatedly about
errors but has not taken steps to correct
Authorized Access - a) Need technical controls to allow restricted access to sensitive information
b) Create politics on a "need to know" basis and consider physical blocking
devices in clicks
Automated Judgement - a) Rise of expert systems (AI) in decision making
b) ex. College students and credit cards by major
Data Mining and Profiling - ex. Combination of data between online ads and mail ads. Over
generalization
Opt-Out - unless data subjects register an overt objection, it is assumed that the
additional use of the data is acceptable
Computer Virus - software that is capable of executing an unwanted action on the victim's
computer and has a mechanism for replicating itself inside other computers that come in contact with
the infected machine
Rootkit - Computer software that hides the presence and activity of intruders
, -Used in combo with trojan software, hackers can change system settings and use the computer without
the user or monitoring software detecting it
Trojan Horse - -It claims to do one thing or nothing harmful but instead does damage when you
run it
-Can be controlled remotely by hackers to extract passwords and other sensitive info
-Can also be used to create zombie, for forwarding advertising spam, phishing emails and Trojan
software to millions of other companies on the internet
Phishing - Software that tricks internet users into divulging their personal info for use or resale by
criminals who can profit from the info (Eg. fake emails and websites that look like real and from
legitimate sources)
Computer Intrusion/Hacking - Unauthorized access to a computer system, whether it be a manual
such as using a stolen password or automated through software to bypass network security protection
via the Internet
Denial-of-Service Attack - Inundating a computer, router or other networked device with more
packets of data than it can process, effectively blocking any legitimate requests to access the system
Botnets - Networked groups of compromised computers or zombies that are controlled by
hackers, usually through Trojan software to deliver spam, phishing, and DoS attacks
Man-in-the-Middle Attack - -Criminals create bogus sites that are capable of communicating
directly with legitimate sites in real time
-Victims access their actual accounts online or using hardware token, but do it through the man-in-the-
middle servers that capture all their information
-These servers can even force the legitimate site to keep secure sessions open after the victim has logged
off , allowing criminals to access the account and withdraw money
Social Engineering - In the context of information security, refers to psychological manipulation of
people into performing actions r divulging confidential information
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper ACADEMICMATERIALS. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €7,61. Je zit daarna nergens aan vast.