Term
|
Definition
Finds and eliminates computer viruses |
|
|
Term
|
Definition
The presence of documentation that allows a transaction to be traced through all stages of information processing |
|
|
Term
|
Definition
Important security measure; duplicate files of data or programs |
|
|
Term
|
Definition
Using your voice or fingerprints to identify you electronically |
|
|
Term
|
Definition
Managers must confront numerous ethical questions in their business |
|
|
Term
|
Definition
Criminal actions accomplished through the use of computer systems, especially with intent to defraud, destroy, or make unauthorized use of computer system resources. |
|
|
Term
|
Definition
Using computers to monitor the activities of employees |
|
|
Term
|
Definition
A program that makes copies of itself and destroys data and programs |
|
|
Term
|
Definition
Cyberlaw Laws and regulations focused on issues related to the internet and other forms of networked communications |
|
|
Term
|
Definition
A plan to continue IS operations during an emergency |
|
|
Term
|
Definition
Scrambling data during transmission |
|
|
Term
|
Definition
Designing computer hardware, software and workstations that are safe, comfortable, and easy to use. |
|
|
Term
|
Definition
A computer system that serves as a filter for access to and from other networks by a company’s networked computers |
|
|
Term
|
Definition
Electronic breaking and entering into a computer system |
|
|
Term
Intellectual property theft |
|
Definition
Unauthorized copying of copyrighted material |
|
|
Term
|
Definition
Used for security management and are unique |
|
|
Term
|
Definition
Unauthorized copying of software |
|
|
Term
|
Definition
Indiscriminate sending of unsolicited e-mail messages (spam) to many internet users. |
|
|
Term
|
Definition
Software that provides a service yet provides advertisements to the user, spyware collects information about that user. |
|
|
Term
|
Definition
Using company computers to access the internet during work hours for personal business. |
|
|