Proportionality - ️️The good achieved by the technology must outweigh the harm or
risk
Informed Consent - ️️Those affected by the technology should understand and
accept the risks
Ethics - ️️-Also known as moral philosophy
-A branch of philosophy that addresses questions about mora...
ISQS 2340 EXAM 4 DELGADILLO
Proportionality - ✔️✔️The good achieved by the technology must outweigh the harm or
risk
Informed Consent - ✔️✔️Those affected by the technology should understand and
accept the risks
Ethics - ✔️✔️-Also known as moral philosophy
-A branch of philosophy that addresses questions about morality--that is, concepts such
as good and evil, right and wrong
Justice - ✔️✔️The benefits and burdens of the technology should be distributed fairly
Minimized Risk - ✔️✔️Even if judged acceptable by the other three guidelines, the
technology must be implemented so as to avoid all unnecessary risk
Business Professionals (Ethical Responsibility) - ✔️✔️-Have a responsibility to promote
ethical uses of information technology in the workplace
Computer Crime - ✔️✔️-The unauthorized use, access, modification, and destruction
of hardware, software, data, or network resources
-The unauthorized release of information
-Using or conspiring to use computer or network resources illegally to obtain information
or tangible property
Sniffer - ✔️✔️Programs that search individual packets of data as they pass through the
internet
Hacking - ✔️✔️The forced access and use of networked computer systems
Spoofing - ✔️✔️Faking an email address to trick users into passing along critical
information like passwords or credit card numbers
Phishing - ✔️✔️-An attempt to trick a person into giving away their private account
information by confirming it at the phisher's website.
-Spoofed emails are sent to a randomly chosen group of perspective victims with hope
that a portion will be received by actual customers.
Denial of Service Attack - ✔️✔️Hammering a website's equipment with too many
requests for information
, Scans - ✔️✔️Widespread probes of the internet to determine types of computers,
services, and connections.
Trojan Horse - ✔️✔️-A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software.
-Unlike viruses, they cannot replicate. They need to be invited usually when a user
opens an email attachment.
Malicious Applets - ✔️✔️Tiny Java programs that misuse your computer's resources,
modify files on the hard disk, send fake emails, or steal passwords.
Back Doors - ✔️✔️A hidden point of entry to be used in case the original point of entry
had been detected or blocked.
Dumpster Diving - ✔️✔️Sifting through a companies garbage to find their information to
help break into their computers.
Keystroke Logging - ✔️✔️Technique embedded in some program that enables the
recording and reporting of a user's keystrokes.
Logic Bomb - ✔️✔️An instruction in a computer program that triggers a malicious act.
Buffer Overflow - ✔️✔️A technique for crashing by sending too much data in a
computer's memory
Cyber Theft - ✔️✔️Computer crime involving the theft of money.
Password Crackers - ✔️✔️Software that can guess passwords
Social Engineering - ✔️✔️Gaining access to a computer system by talking
unsuspecting company employees out of valuable information such as passwords.
Spamming - ✔️✔️Indiscriminate sending of unsolicited email messages to many
internet users (junk mail)
Flaming - ✔️✔️-Sending extremely critical, derogatory, and often vulgar email
messages or newsgroup postings to other users on the internet or online services
(Flame Mail)
Internet Abuses in the Workplace - ✔️✔️-General email abuses
-Copyright infringement
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper PatrickKaylian. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €9,19. Je zit daarna nergens aan vast.