Term
|
Definition
small file deposited on a harddrive containing information about the customer and their web activities |
|
|
Term
|
Definition
Hidden software that tracks online movements |
|
|
Term
|
Definition
Captures keystrokes from the keyboard to the motherboard |
|
|
Term
|
Definition
Intangible creative work that is embodied in physical form |
|
|
Term
Employee Monitoring Policy |
|
Definition
How, When, and where the company monitors its employees |
|
|
Term
|
Definition
General principles to guide computer user behavior |
|
|
Term
|
Definition
A contractual stipulation that ebusiness participants do not deny their online actions. Keep emails for this reason. |
|
|
Term
|
Definition
Acceptable Use Policy
A policy a user must agree to follow in order to be provided access to a network or to the internet |
|
|
Term
|
Definition
a. Can be read by Service Provider, Recipient’s service provider, router operators, phone companies |
|
|
Term
User expectation of privacy |
|
Definition
a. Compliment ethical computer use, defines legitimate email users, identifies backup procedures, informs email control, explains ramifications for leaving, asks employees to be careful when posting organizational information |
|
|
Term
What should you opt out of? |
|
Definition
a. Member directories that may place and email address online |
|
|
Term
|
Definition
|
|
Term
|
Definition
Register on website knows if on computer |
|
|
Term
|
Definition
When you track a consumers navigation thru a website |
|
|
Term
What is information Security |
|
Definition
a. The protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
What is information Security |
|
Definition
a. The protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
What is the first line of defense pertaining to security? |
|
Definition
|
|
Term
|
Definition
a. Using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
|
Term
3 primary information technology security areas? |
|
Definition
a. Authentication and authorization, prevention and resistance, detection and response |
|
|
Term
What the method for finding a user ID |
|
Definition
|
|
Term
|
Definition
a. Small electronic devices that change used passwords automatically |
|
|
Term
Whats a credit card size device that contains embedded technology to perform limited tasks? |
|
Definition
|
|
Term
What the identification of a user based on fingerprint, iris, face? |
|
Definition
|
|
Term
What is the most costly but most effective authentication technology |
|
Definition
|
|
Term
What are the security prevention and resistance technologies? |
|
Definition
content filtering, firewall, encryption |
|
|
Term
|
Definition
prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading |
|
|
Term
|
Definition
a. If there were a security breach and the information were encrypted then you would be able to read it. |
|
|
Term
|
Definition
hardware and/or software that guards a private network by analyzing the information leaving and entering the network |
|
|
Term
What is an example of detection and response technology |
|
Definition
|
|
Term
|
Definition
a. This hides inside other software, usually as an attachment or a downloadable file |
|
|