Term
|
Definition
Ensuring the accuracy, integrity, and safety of business/IT activities and resources. |
|
|
Term
Information system controls |
|
Definition
Control totals, error signals, backup files, and security codes are examples. |
|
|
Term
|
Definition
Software that can control access and use of a computer system. |
|
|
Term
|
Definition
A computer system can continue to operate even after a major system failure if it has this capability. |
|
|
Term
|
Definition
A computer system that serves as a filter for access to and from other networks by a company's networked computers. |
|
|
Term
|
Definition
Laws and regulations focused on issues related to the Internet and other forms of networked communications. |
|
|
Term
|
Definition
The presence of documentation that allows a transaction to be traced through all stages of information processing. |
|
|
Term
|
Definition
Using your voice of fingerprints to identify yourself electronically. |
|
|
Term
Distributed denial of service |
|
Definition
A plan to continue IS operations during an emergency. |
|
|
Term
|
Definition
Scrambling data during its transmission. |
|
|
Term
|
Definition
Ethical choices may result from decision-making process, cultural values, or behavioral stages. |
|
|
Term
|
Definition
Managers must confront numerous ethical questions in their businesses. |
|
|
Term
|
Definition
Sending unsolicited e-mail indiscriminately. |
|
|
Term
|
Definition
Software that can infect a machine and transmit private information back to its owner. |
|
|
Term
|
Definition
Two different perspectives on the use of private information. |
|
|
Term
|
Definition
Using computers to identify individuals that fit a certain profile. |
|
|
Term
|
Definition
Using computers to identify individuals that will fit a certain profile. |
|
|
Term
|
Definition
Overwhelming a Web sit with requests for service from captive computers. |
|
|
Term
|
Definition
Using computers and networks to steal money, services, software, or data. |
|
|
Term
|
Definition
Using company computers to access the Internet during work hours for personal business. |
|
|
Term
|
Definition
Unauthorized copying of software |
|
|
Term
Intellectual property theft |
|
Definition
Unauthorized copying of copyrighted material. |
|
|
Term
|
Definition
Electronic breaking and entering into a computer system. |
|
|
Term
|
Definition
A program that makes copies of itself and destroys data and programs. |
|
|
Term
|
Definition
Finds and eliminates computer viruses. |
|
|
Term
|
Definition
Sending extremely critical, derogatory, and vulgar e-mail messages. |
|
|
Term
|
Definition
Designing computer hardware, software, and workstations that are safe, comfortable, and easy to use. |
|
|