Chapter 13 Flashcards
Ensuring the accuracy, integrity, and safety of
business/IT activities and resources.
Security management
Control totals, error signals, backup files, and
security codes are examples.
Information system
controls
Software that can control access and use of a computer system.
System security monitor
A computer system can continue to operate even after a major system failure if it has this capability.
Fault tolerant
A computer system that serves as a filter for access to and from other networks by a company’s networked computers
Firewall
Laws and regulations focused on issues related
to the Internet and other forms of networked
communications
Cyber law
The presence of documentation that allows a
transaction to be traced through all stages of
information processing.
Audit traiL
Using your voice or fingerprints to identify yourself electronically.
Biometric security
A plan to continue IS operations during an
emergency.
Disaster recovery
Scrambling data during its transmission.
Encryption
Ethical choices may result from decision-making
processes, cultural values, or behavioral stages.
Ethical foundations
Managers must confront numerous ethical
questions in their businesses.
Business ethics
Sending unsolicited e-mail indiscriminately.
Spamming
Software that can infect a machine and transmit
private information back to its owner.
Spyware/Adware
Two different perspectives on the use of private
information
Opt-in/Opt-out
Using computers to identify individuals that fit a
certain profile.
Computer matchinG
Using computers to monitor the activities of
workers.
Computer monitoring
Overwhelming a Web site with requests for service
from captive computers.
Distributed denial of service
(DDOS
Using computers and networks to steal money,
services, software, or data.
Computer crime
Using company computers to access the Internet
during work hours for personal business.
. Unauthorized use
Unauthorized copying of software.
Software piracy
. Unauthorized copying of copyrighted material.
Intellectual property
theft
Electronic breaking and entering into a computer
system
. Hacking
A program that makes copies of itself and destroys
data and programs.
Computer virus