Ethics Flashcards

1
Q

Utilitarian Ethics

A

Utilitarian ethics is based on the guiding principle that the consequence of an action is the most important factor in determining if the action is moral or not. For example, an action that maximizes the greatest good for the greatest amount of people is an ethical choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The rights approach

A

The rights approach is guided by the principle which states that an individual has the right to make their own choices, which cannot be violated by another person’s decision. This decision must respect and consider the fundamental rights of the individual. These fundamental rights include the right to truth, privacy, safety and for society to apply laws fairly to all members of society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The common good approach

A

The common good approach proposes that ethical actions are those that benefit the entire community. It challenges individuals to recognize and pursue the values and goals shared with other members of a community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer-targeted crime

A

Where a computer is the target of a criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer-assisted crime

A

Occurs when a computer is used to commit a crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer-incidental crime

A

Where a computer provides information that is incidental to an actual crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Statutory Law

A

The U.S. Congress has established federal administrative agencies and a regulatory framework that includes both civil and criminal penalties for failing to follow the rules.

Criminal laws enforce a commonly accepted moral code backed by the authority of the government. For example, the Computer Fraud and Abuse Act is a statutory law that prohibits accessing a computer without authorization, or in excess of authorization. Violating these rules could result in a fine or prison sentence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrative Law

A

A legal framework that governs the activities of administrative agencies of government, administrative law ensures that public bodies act in accordance with the law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common law

A

Common law cases work their way through the judicial system providing precedents and constitutional bases for lawmaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FISMA

A

The Federal Information Security Management Act

FISMA stipulates that federal agencies must create an information security program that includes:
- Risk assessments
- An annual inventory of IT systems
- Policies and procedures to reduce risk
- Security awareness training
- Testing and evaluation of all IT system controls
- Incident response procedures
- A continuity of operations plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ECPA

A

Electronic Communications Privacy Act 1986
The ECPA aims to ensure workplace privacy and protects a range of electronic communications such as email and telephone conversations from unauthorized interception, access, use and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CFFA

A

Computer Fraud and Abuse Act 1986
Enacted in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, CFAA prohibits unauthorized access to computer systems. Knowingly accessing a government computer without permission or accessing any computer used in or affecting interstate or foreign commerce is a criminal offense. The Act also criminalizes the trafficking of passwords or similar access information, as well as knowingly transmitting a program, code or a command that results in damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly