Proportionality - ️️The good achieved by the technology must outweigh the harm or
risk
Informed Consent - ️️Those affected by the technology should understand and
accept the risks
Ethics - ️️-Also known as moral philosophy
-A branch of philosophy that addresses questions about mora...
ISQS 2340 EXAM 4 DELGADILLO
Proportionality - ✔️✔️The good achieved by the technology must outweigh the harm or
risk
Informed Consent - ✔️✔️Those affected by the technology should understand and
accept the risks
Ethics - ✔️✔️-Also known as moral philosophy
-A branch of philosophy that addresses questions about morality--that is, concepts such
as good and evil, right and wrong
Justice - ✔️✔️The benefits and burdens of the technology should be distributed fairly
Minimized Risk - ✔️✔️Even if judged acceptable by the other three guidelines, the
technology must be implemented so as to avoid all unnecessary risk
Business Professionals (Ethical Responsibility) - ✔️✔️-Have a responsibility to promote
ethical uses of information technology in the workplace
Computer Crime - ✔️✔️-The unauthorized use, access, modification, and destruction
of hardware, software, data, or network resources
-The unauthorized release of information
-Using or conspiring to use computer or network resources illegally to obtain information
or tangible property
Sniffer - ✔️✔️Programs that search individual packets of data as they pass through the
internet
Hacking - ✔️✔️The forced access and use of networked computer systems
Spoofing - ✔️✔️Faking an email address to trick users into passing along critical
information like passwords or credit card numbers
Phishing - ✔️✔️-An attempt to trick a person into giving away their private account
information by confirming it at the phisher's website.
-Spoofed emails are sent to a randomly chosen group of perspective victims with hope
that a portion will be received by actual customers.
Denial of Service Attack - ✔️✔️Hammering a website's equipment with too many
requests for information
, Scans - ✔️✔️Widespread probes of the internet to determine types of computers,
services, and connections.
Trojan Horse - ✔️✔️-A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software.
-Unlike viruses, they cannot replicate. They need to be invited usually when a user
opens an email attachment.
Malicious Applets - ✔️✔️Tiny Java programs that misuse your computer's resources,
modify files on the hard disk, send fake emails, or steal passwords.
Back Doors - ✔️✔️A hidden point of entry to be used in case the original point of entry
had been detected or blocked.
Dumpster Diving - ✔️✔️Sifting through a companies garbage to find their information to
help break into their computers.
Keystroke Logging - ✔️✔️Technique embedded in some program that enables the
recording and reporting of a user's keystrokes.
Logic Bomb - ✔️✔️An instruction in a computer program that triggers a malicious act.
Buffer Overflow - ✔️✔️A technique for crashing by sending too much data in a
computer's memory
Cyber Theft - ✔️✔️Computer crime involving the theft of money.
Password Crackers - ✔️✔️Software that can guess passwords
Social Engineering - ✔️✔️Gaining access to a computer system by talking
unsuspecting company employees out of valuable information such as passwords.
Spamming - ✔️✔️Indiscriminate sending of unsolicited email messages to many
internet users (junk mail)
Flaming - ✔️✔️-Sending extremely critical, derogatory, and often vulgar email
messages or newsgroup postings to other users on the internet or online services
(Flame Mail)
Internet Abuses in the Workplace - ✔️✔️-General email abuses
-Copyright infringement
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.69. You're not tied to anything after your purchase.