Chapter 8 Flashcards Preview

BTMA Finals > Chapter 8 > Flashcards

Flashcards in Chapter 8 Deck (15):
1

Define ethics (1)

- principles and standards that guide our behaviour towards people

2

Two factors that determine how you decide ethical issues (2)

- basic ethical structure, developed as you grow
- set of practical circumstances, neither black nor white

3

The 5 ethical decisions (5)

- consequence: who benefits
- likelihood of effect: benefit or harm
- relatedness: connection
- society opinion: perspective on effect
- reach of result: how many people are affected

4

Define intellectual property (1)

- intangible creative work that embodies in the physical form (painting, drawings)

5

Define copy right law, fair use doctrine, and pirated software (3)

- copy right law: protect authorship
- fair use doctrine: may use copyright material, in certain situation
- pirated software: unauthorized use

6

Define keylogger/key tapper software (1)

- program that records all keystrokes and mouseclicks

7

Define packet sniffer (2)

- examine information passing by
- sender computer, sender server, recipient server, recipient computer

8

Define identity theft (1)

- forging someone identity

9

4 different identity thefts (4)

- phishing: gain personal information, usually from emails
- spear phishing: target specific individual
- whaling: use of phishing on business executives, government
- pharming: rerouting the request for legitimate website

10

Define monitoring technology (1)

- scan incoming and out coming emails

11

Define hardware key logger (1)

- capture keystroke on their journey from keyboard to motherboard (can't capture anything not typed)

12

Privacy of consumer (8)

- cookies: small files that contain information
- unique cookies: monitor and record web activities
- common cookies: start as unique cookie then sold to third party (double click)
- spam: unsolicited email
- adware: generate ads when you download something for free
- spyware: collect information without permission
- anonymous web browsing: hides identity
- web log: one line of information for every visitor (click stream)

13

Type of cyber crime (3)

- virus: written with bad intent to cause annoyance
- worm: virus that spread from itself from computer to computer
- denial of a service attack: floods a service with many request to slow down or make it crash

14

Computer virus can't (2)

- hurt hardware
- hurt any file they weren't designed to attack

15

Security precautions (6)

- anti virus software
- firewall
- encryption
- public key encryption
- access authentication
- biometric