100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ISQS 2340 EXAM 4 DELGADILLO Questions With Answers Graded A+ Assured Success €9,19   In winkelwagen

Tentamen (uitwerkingen)

ISQS 2340 EXAM 4 DELGADILLO Questions With Answers Graded A+ Assured Success

 7 keer bekeken  0 keer verkocht
  • Vak
  • ISQS 2340DELGADILLO
  • Instelling
  • ISQS 2340DELGADILLO

Proportionality - ️️The good achieved by the technology must outweigh the harm or risk Informed Consent - ️️Those affected by the technology should understand and accept the risks Ethics - ️️-Also known as moral philosophy -A branch of philosophy that addresses questions about mora...

[Meer zien]

Voorbeeld 2 van de 6  pagina's

  • 18 september 2024
  • 6
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • ISQS 2340DELGADILLO
  • ISQS 2340DELGADILLO
avatar-seller
ISQS 2340 EXAM 4 DELGADILLO
Proportionality - ✔️✔️The good achieved by the technology must outweigh the harm or
risk

Informed Consent - ✔️✔️Those affected by the technology should understand and
accept the risks

Ethics - ✔️✔️-Also known as moral philosophy
-A branch of philosophy that addresses questions about morality--that is, concepts such
as good and evil, right and wrong

Justice - ✔️✔️The benefits and burdens of the technology should be distributed fairly

Minimized Risk - ✔️✔️Even if judged acceptable by the other three guidelines, the
technology must be implemented so as to avoid all unnecessary risk

Business Professionals (Ethical Responsibility) - ✔️✔️-Have a responsibility to promote
ethical uses of information technology in the workplace

Computer Crime - ✔️✔️-The unauthorized use, access, modification, and destruction
of hardware, software, data, or network resources
-The unauthorized release of information
-Using or conspiring to use computer or network resources illegally to obtain information
or tangible property

Sniffer - ✔️✔️Programs that search individual packets of data as they pass through the
internet

Hacking - ✔️✔️The forced access and use of networked computer systems

Spoofing - ✔️✔️Faking an email address to trick users into passing along critical
information like passwords or credit card numbers

Phishing - ✔️✔️-An attempt to trick a person into giving away their private account
information by confirming it at the phisher's website.

-Spoofed emails are sent to a randomly chosen group of perspective victims with hope
that a portion will be received by actual customers.

Denial of Service Attack - ✔️✔️Hammering a website's equipment with too many
requests for information

, Scans - ✔️✔️Widespread probes of the internet to determine types of computers,
services, and connections.

Trojan Horse - ✔️✔️-A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software.

-Unlike viruses, they cannot replicate. They need to be invited usually when a user
opens an email attachment.

Malicious Applets - ✔️✔️Tiny Java programs that misuse your computer's resources,
modify files on the hard disk, send fake emails, or steal passwords.

Back Doors - ✔️✔️A hidden point of entry to be used in case the original point of entry
had been detected or blocked.

Dumpster Diving - ✔️✔️Sifting through a companies garbage to find their information to
help break into their computers.

Keystroke Logging - ✔️✔️Technique embedded in some program that enables the
recording and reporting of a user's keystrokes.

Logic Bomb - ✔️✔️An instruction in a computer program that triggers a malicious act.

Buffer Overflow - ✔️✔️A technique for crashing by sending too much data in a
computer's memory

Cyber Theft - ✔️✔️Computer crime involving the theft of money.

Password Crackers - ✔️✔️Software that can guess passwords

Social Engineering - ✔️✔️Gaining access to a computer system by talking
unsuspecting company employees out of valuable information such as passwords.

Spamming - ✔️✔️Indiscriminate sending of unsolicited email messages to many
internet users (junk mail)

Flaming - ✔️✔️-Sending extremely critical, derogatory, and often vulgar email
messages or newsgroup postings to other users on the internet or online services
(Flame Mail)

Internet Abuses in the Workplace - ✔️✔️-General email abuses

-Copyright infringement

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper PatrickKaylian. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €9,19. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 84197 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€9,19
  • (0)
  Kopen