19: Privacy, Ethics and Security Flashcards

1
Q

Define privacy

A

Claim of individuals to be left alone, free from surveillance or interference from other individuals or organisations, or state - in control of your own information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ethics

A

Principles of right and wrong that individuals used to make behavioural decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defkine security

A

Policies, procedures and technical measures used to prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define controls

A

methods, policies and organisational procedures that ensure safety of an organisations assets and adherance to standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

list 7 key ethocal questions

A
  • who decides what can be collected
  • Who owns the collected data
  • what are the user rights regarding collection
  • who regulates how tje data is managed
  • what responsibilities do the organisations have
  • what laws are there for updating regulations
  • how can individuals or organisations secure their data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

list 4 tech trends that raise ethical issues

A
  • increases in computing power
  • decreases in storage costs
  • advances in data analytics
  • networking advances
  • mobile device growth impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 2 categories of advancements in data analytics

A
  1. profiling: combining data from multiple sources to create dossiers of detailed information on individuals
  2. Non0obvious relationship awareness (NORA) - combining data to find obscure hidden connections to help identify criminals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

list 3 ways of managing ethics

A
  • rights
  • regulation
  • responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is responsibility

A

accepting costs, duties and obligations for decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define accountability

A

Mechanisms for identifying responsible parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define liability

A

Permits to recover damages done to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

define due process

A

laws are well known and understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

list the 2022 2Laudon 5 step process for ethical analysis

A
  1. identify and clearly describe facts
  2. define conflict or dillema and identify the higher order values involved
  3. identify stakeholders
  4. identify the options that can you can reasonably take
  5. identify the potential consequences of your options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the 6 candidate ethical principles/rules:

A
  1. golden rule - do to others what you would have them do to you
  2. Immanuel Kants categorical imperative: if an action is not right for everyone, it is not right for anyone
  3. slippery slope rule: if an action cannot be taken repeatedly it is wrong
  4. Utalitarian principle: take the action that achieves the higher or greater value
  5. risk aversion principle: take action that produces least harm or potential cost
  6. ethical “no free lunch” rule: assure that virtually all tangible and objects are owned by someone unless there is a specific declaration otherwise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

name and explain the US policy

A

US federal trade commission fair information practice principles:
- notice/awareness
- choice/consent
- access/participation
- security/enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

name and explain the EU policy

A

EU General data protection regulation
- Requires unambiguous explicit customer consent
- countries cant transfer data to other countries
- privacy shield - all countries processing EU data must conform to the policy
- heavy fines

17
Q

list 4 factors that have grown importance of privacy ethics etc

A
  • web 2.0 extended reach of internet beyond business relationships
  • more devices per use = more data
  • lots more types of data per individual
  • laws and regulations playing catch-up
18
Q

List 3 security vulnaribilities of the internet

A
  • Network is open to anyone so abuses have a wide impact
  • corporate networks linked to internet are more vulnerable
  • email, IM (back door to secure network), and P2P (transmission of malicious software to expose corporate data) Increase vulnarability
19
Q

list 3 types of malicious software

A
  • trojan horse
  • SQL injection attacks
  • Ransomware
  • Spyware
20
Q

list 6 types of computer crime

A
  • System intrusion
  • system damage
  • cyber vandalism
  • identity theft
  • spam
  • cyberterrorism
  • cyberwarfare
21
Q

outline the 5 step organosational FW for security and control:

A
  • IS controls
  • Risk assesment
  • security policy
  • disaster recovery planning and business continuity planning
  • auditing
22
Q

explain IS control as part of org FW for security

A
  • general controls: govern design, security and use ; software controls, hardware controls, sata security etc
23
Q

explain risk assesmmnet as part of org FW for security

A

Outline:
- type of threat
- probability of occurance
- impact/potential losses
- financial impact

24
Q

explain security policy as part of org FW for security

A
  • rank info risk, identify security goals and mechanisms for achieving
  • drives other policies
  • acceptable use policies
  • identity management of valid users and controlling access
25
Q

explain disaster recovery planning and business continuity planning as part of org FW for security

A
  • disaster recovery planning
  • continuity planning: restoring ops after
  • both plans must identify critical areas`
26
Q

explain audit as part of org FW for security

A
  • IS audit for overall security
  • security audits in specific areas - tech, docs…
  • rank weaknesses
  • assess financial and org impact of each threat
27
Q

list 7 technologies for safeguarding information

A
  • authentications
  • firewalls, antimalware software
  • secure wireless networks
  • encryption and public key infrastructure
  • securing transactions
  • ensuring system availability
  • achieving digital resillience
28
Q
A