Chapter 3 and 4 Flashcards

(17 cards)

1
Q

What is ethics?

A

A set of principles of right and wrong used by individuals and organizations to make choices and guide behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four major categories of information ethical issues?
A:

A

Privacy
Accuracy
Property
Accessibility (PAPA framework).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the “right to privacy”?

A

The right to be left alone and free from unreasonable personal intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are threats to privacy?

A

Personal information in databases.
Electronic surveillance.
Social media misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are accuracy issues in information ethics?

A

Concerns about the authenticity, fidelity, and correctness of information, including threats like misinformation and algorithm inaccuracies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are property issues in information ethics?

A

Questions about who owns information and how to determine fair prices for its exchange, especially in IoT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are accessibility issues in information ethics?

A

Concerns about who has the right to access information and under what conditions, including algorithm transparency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three general ethical standards?

A

Utilitarian: The greatest good for the greatest number.
Rights-based: Respect and protect the rights of affected parties.
Fairness: Equal treatment of all individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What legal protections exist for privacy?

A

PIPEDA (Personal Information Protection and Electronic Documents Act).
The Privacy Act.
GDPR (General Data Protection Regulation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is information security?

A

Processes and policies designed to protect information and systems from unauthorized access, use, disruption, modification, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main categories of threats to information security?

A

People threats: Human error, social engineering.
Technology threats: Software attacks (e.g., DDoS), SCADA attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering?

A

Manipulating individuals into providing confidential information, such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A

Attempts to obtain sensitive information by pretending to be a trustworthy entity via email, IM, social networks, or vishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spear-phishing?

A

A phishing attack targeted at a specific organization, often with high stakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Distributed Denial of Service (DDoS) attack?

A

An attack where multiple compromised devices flood a target system with information requests, causing it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are SCADA systems, and why are they vulnerable?

A

Large-scale, distributed monitoring systems used in critical infrastructures like electricity and nuclear plants.
They were not originally designed with IT security in mind but are now increasingly connected to the internet.

17
Q

What is the information security control framework?

A

Defense mechanisms to safeguard assets, optimize resource use, and prevent or detect errors and fraud.