Term
|
Definition
the legal protection afforded an expression of an idea |
|
|
Term
|
Definition
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents |
|
|
Term
|
Definition
the principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent |
|
|
Term
|
Definition
the assurance that messages and information remain aviailable only to those authorized to view them |
|
|
Term
|
Definition
govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself |
|
|
Term
|
Definition
the unauthorized use, duplication, distribution, or sale of copyrighted software |
|
|
Term
|
Definition
software that is manufactured to look like the real thing and sold as such |
|
|
Term
|
Definition
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow efficiently |
|
|
Term
|
Definition
a method or system of government for information manafement or control |
|
|
Term
|
Definition
the act of conforming, acquiescing, or yielding information |
|
|
Term
ediscovery (electronic discovery) |
|
Definition
the abilityof a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry |
|
|
Term
|
Definition
policies and procedures that address information management along with the ethical use of computer and the Internet in the business environment |
|
|
Term
ethical computer use policy |
|
Definition
contains general principles to guide computer user behavior |
|
|
Term
information privacy policy |
|
Definition
contains general principles regarding information privacy |
|
|
Term
|
Definition
requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet |
|
|
Term
|
Definition
a contractual stipulation ton ensure the ebusiness participants do not deny (repudiate) their online actions |
|
|
Term
|
Definition
contains general principles to guide the proper use of the Internet |
|
|
Term
|
Definition
details the extent to which email messages may be read by others |
|
|
Term
|
Definition
sens a massive amount of email to a specific person or system that can cause that user's server to stop functioning |
|
|
Term
|
Definition
|
|
Term
|
Definition
states taht email users will not send unsolicited emails (or spam) |
|
|
Term
|
Definition
outlines the corporate guidlines or principles governming employee online communications |
|
|
Term
information technology monitoring |
|
Definition
tracks people's activities by such measures as number keystrokes, error rate, and number of transactions processed |
|
|
Term
employee monitoring policy |
|
Definition
stating explicitly how, when, and where the company monitors its employees |
|
|
Term
|
Definition
a period of time when a system is unavailable |
|
|
Term
|
Definition
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
experts in technology who use their knowledge to break into computers and computer networkds, either for profit or just motivated by the challenge |
|
|
Term
|
Definition
break int other people's computer system and may just look around or steal and destroy information |
|
|
Term
|
Definition
have criminal intent when hacking |
|
|
Term
|
Definition
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destructionn |
|
|
Term
|
Definition
have philosphical and political reasons for breaking into systems and will often deface the website as a protest |
|
|
Term
script kiddies (script bunnies) |
|
Definition
find hacking code on the Internet and clock-and-point their way into systems to cause damage or spread viruses |
|
|
Term
|
Definition
work at the request of the system owners to find system vulnerabilities and plug the holes |
|
|
Term
|
Definition
software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
software that, while purporting to serve some useful function and often fulfilling that function, also allows the Internet advertisers to display advertisements without the consent of the computer user |
|
|
Term
|
Definition
a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission |
|
|
Term
|
Definition
open ways into the network for future attacks |
|
|
Term
denial-of-service attack (DoS) |
|
Definition
floods a website with so many requests for service that it slows down or crashed the site |
|
|
Term
distributed denial-of-service attack (DDoS) |
|
Definition
attacks from multiple computer that flood a website with so many requests for service that it slows down or crashes |
|
|
Term
polymorphic viruses and worms |
|
Definition
change their form as they propogate |
|
|
Term
|
Definition
hides inside other software, usually as an attachment of a downloadable file |
|
|
Term
|
Definition
spreads itself, not only from file to file, but also from computer to computer and can tunnel themselves into computers |
|
|
Term
|
Definition
a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system |
|
|
Term
|
Definition
attack computer systems by transmitting a virus hoax, with a real virus attached |
|
|
Term
|
Definition
includes a variety of threats such as viruses, worms, and Trojan horses |
|
|
Term
|
Definition
consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network |
|
|
Term
|
Definition
a program or device that can monitor data traveling over a network |
|
|
Term
|
Definition
the forging of the return address on an email so that the message appears to come from someone other than the actual sender |
|
|
Term
|
Definition
fake blogs created soley to raise the search engine rank of affiliated websites |
|
|
Term
|
Definition
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
legitimate users who purposely or accidently misuse their access to the environment and cause some kind of business-affecting incident |
|
|
Term
|
Definition
hackers use their social skills to trick people into revealing access credentials or other valuable information |
|
|
Term
|
Definition
looking through people's trash |
|
|
Term
information security policies |
|
Definition
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days |
|
|
Term
information security plan |
|
Definition
details how an organization will implement the information security policies |
|
|
Term
|
Definition
the forging of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought they came from legitimate businesses |
|
|
Term
|
Definition
reroutes requests for legitimate websites to false websites |
|
|
Term
|
Definition
a method of confirming users' identities |
|
|
Term
|
Definition
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space |
|
|
Term
|
Definition
small electronic devices that cahnge useres passwords automatically |
|
|
Term
|
Definition
a device about the size of a credit card, containing embedded tachnologies that can store information and small amount of software to perform some limited processing |
|
|
Term
|
Definition
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting |
|
|
Term
|
Definition
occurs when organization use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information |
|
|
Term
|
Definition
scambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
public key encription (PKE) |
|
Definition
uses two keys: a public key that everyone can have asn a private key for only the recipient |
|
|
Term
|
Definition
a trusted third party that validates use identities by means of digital certificates |
|
|
Term
|
Definition
a data file that indentifies individuals or organizations online and comparable to a digital signature |
|
|
Term
|
Definition
a hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings |
|
|
Term
|
Definition
scans and searches hard drives to prevent, detect, and remove known ciruses, adware, and spyware |
|
|
Term
intrusion detection software (IDS) |
|
Definition
features full-time monitoring tools that search for patterns in network traffic to identify intruders |
|
|