MIDTERM_AQUINO Flashcards

1
Q

It is a set of beliefs about right and wrong behavior within a society.

A

ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

conforms to generally accepted standards, many of which are almost universal.

A

Ethical behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a set of guidelines which are designed to set out acceptable behavior of a group, association and profession.

A

Professional Code of Ethics?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

does not provide a complete guide to ethical behavior. Just because an activity is not defined as illegal does not mean it is ethical.

A

Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

I will promote public knowledge, understanding and appreciation of Information and Communications technology

A

Code of Ethics for the Filipino ICT Professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

I will consider the general welfare and public welfare and public good in the performance of my work.

A

Code of Ethics for the Filipino ICT Professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I will advertise goods or professional services in a clear and truthful manner.

A

Code of Ethics for the Filipino ICT Professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code of Ethics for the Filipino ICT Professionals

A

-I will promote public knowledge, understanding and appreciation of Information and Communications technology.
-I will consider the general welfare and public welfare and public good in the performance of my work.
-I will advertise goods or professional services in a clear and truthful manner.
-I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of Information and Communications Technology.
-I will accept the full responsibility for the work undertaken and utilize my skills with competence and professionalism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of Information and Communications Technology.

A

Code of Ethics for the Filipino ICT Professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I will accept the full responsibility for the work undertaken and utilize my skills with competence and professionalism.

A

Code of Ethics for the Filipino ICT Professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Thou shalt not use a computer to harm other people.

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Thou shalt not interfere with other people’s computer work.

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Thou shalt not snoop around in other people’s computer files.

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Thou shalt not use a computer to steal

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Thou shalt not use a computer to bear false witness

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Thou shalt not copy or use proprietary software for which you have not paid (without permission).

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Thou shalt not use other people’s computer resources without authorization or proper compensation

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Thou shalt not appropriate other people’s intellectual output.

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Thou shalt think about the social consequences of the program you are writing or the system you are designing.

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

A

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ten Commandments of Computer Ethics defined by Computer Ethics Institute:

A
  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with 3. other people’s computer work.
  3. Thou shalt not snoop around in other people’s computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness
  6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).
  7. Thou shalt not use other people’s computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people’s intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With tools like the internet, hackers have found it very easy to hack into any computer or system as long as it is connected on internet

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

As much as Information Communication Technology has enabled us to share and find relevant information online, it has also exploited our freedom of privacy

A

Privacy Issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Information and Communications Technology has made it easy for users to access any information or artifact at any given time.

A

Copyright Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Since information and Communications Technology systems must run all the time, pressure is mounted on ICT experts to ensure the accuracy and availability of these systems.

A

Increased pressure on ICT experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Information and Communications technology has many opportunities and it has shaped many industries in developed countries

A

Digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

are statements of what you believe to be rules of right conduct.

A

moral principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

are one’s personal beliefs about right and wrong.

A

Morals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.

A

ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

is a system of rules that tells us what we can and cannot do

A

Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

has risen to the top of the business agenda because the risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

is a statement that highlights an organization’s key ethical issues

A

code of ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

is frequently include a set of formal, written statements about the purpose of an organization, its values, and the principles that should guide its employees’ actions

A

Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

should focus employees on areas of ethical risk relating to their role in the organization

A

Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Decisions about right and wrong permeate everyday life.

A

Ethical Decision Making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Acting properly as individuals, creating responsible organizations and governments, and making our society as a whole more ethical.

A

Ethical Decision Making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

It recognizes that decisions about “right” and “wrong” can be difficult, and may be related to individual context.

A

Ethical Decision Making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

can be traced back to the school of the Ancient Greek philosopher Epicurus of Samos (341-270 BCE), who argued that the best life is one that produces the least pain and distress.

A

Utilitarianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

states that people should maximize human pleasure.

A

Hedonism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An approach also known as ethical egoism, or the ethics of self- interest. In this approach, an individual often uses utilitarian calculation to produce the greatest amount of good for him or herself.

A

Egoistic Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

is most commonly associated with the philosopher Immanuel Kant (1724-1804). Kant argued that doing what is right is not about the consequences of our actions (something over which we ultimately have no control) but about having the proper intention in performing the action

A

Deontological ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

This approach stipulates that the best ethical action is that which protects the ethical rights of those who are affected by the action. It emphasizes the belief that all humans have a right to dignity.

A

The Rights Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

this approach sees what is right as the same as what God commands, and ethical standards are the creation of God’s will.

A

The Divine Command Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

One long-standing ethical principle argues that ethical actions should be consistent with ideal human virtues.

A

The Virtue Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CONSEQUENTIALIST THEORIES
U:
H:
E:
D:
R:
C:
V:
UHEDRCV

A

U: Utilitarianism
H: Hedonism
E: Egoistic Approach
D: Deontological Ethics
R: Rights Approach
C: Divine Command Approach
V: Virtue Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

, just because you can do something doesn’t mean you should do it.

A

Melissa Woo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IT code of ethics

A

Integrity
Competence
Professional Responsibilities
Work Responsibilities
Societal responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization.

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

applies only to people and is required by law

A

licensing

50
Q

is government-issued permission to engage in an activity or to operate a business

A

government license

51
Q

is generally administered at the state level and often requires that the recipient pass a test of some kind.

A

government license

52
Q

has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do.

A

Negligence

53
Q

refers to the obligation to protect people against any unreasonable harm or risk

A

Duty of care

54
Q

Those people who use PCs, tablets, cellphones and other devices to access information systems, data, and the Internet.

A

IT Users

55
Q

Almost as soon as computers began to be used commercially, people began to exploit them for illicit purposes. As the use of computer has spread, so too has computer crime.

A

IT Security Incidents

56
Q

is a crime that is executed using computers or networks of computers. It is done to damage people’s or organizations’ reputation. Some are the ways of computer crimes pose threats are as follows:

A

Computer crime

57
Q

Computer crime:

A

Threat to an individual
Threat to an organization
Threat to groups
Threat to a nation

58
Q

is a cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability. It takes advantage of security flaws that enable unauthorized users to gain access to a computer system or to download sensitive user data

A

zero-day exploit

59
Q

The number of possible entry points to a network expands continually as more devices are added, increasing the possibility of security breaches.

A

Increasing Complexity Increases Vulnerability

60
Q

Time means money. The earlier the active computer users can resolve a problem, the more productive they can be. As a result, computer support desks are under extreme pressure to counter very instantly to user’s questions.

A

Higher Computer User Expectations

61
Q

IT organizations prefer to use already installed software “as is” rather than implement security fixes that will either make the software harder to use or eliminate software harder to use or eliminate “nice to have” features suggested by current users or potential customers, which will help sell the software

A

Increase Reliance on Commercial Software with Known Vulnerabilities

62
Q

With expanded business needs, globalization, collaborative working, and new technological breakthroughs today, information is being shared on networks with millions of other computers.

A

Technological Advancement Introduce New Risks

63
Q

Employees access company data by using their devices such as mobiles, tablets, and personal laptops to have all-time availability and connection with the work, which generates a security threat.

A

Bringing your own device (BYOD) policy

64
Q

Most organizations do not understand the upcoming risks and delay software updates for multiple reasons such as time shortage, extra cost involved, or just negligence, making the organization’s computer vulnerable to attack.

A

Delay in software updates

65
Q

is an attack on an information system that takes advantage of a particular system vulnerability due to poor system design or implementation.

A

exploit

66
Q

is a piece of programming code, usually disguised as something else, that causes a computer to behave unexpectedly and often undesirably.

A

Viruses

67
Q

is a harmful program that resides in the active memory of the computer and duplicates itself without human intervention.

A

worm

68
Q

is a program in which malicious code is hidden inside a seemingly harmless program

A

Trojan horse

69
Q

is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.

A

botnet

70
Q

happens when a malicious hacker takes over computers on the Internet and cause them to flood a target site with demand for data and other small tasks.

A

Distributed Denial-of-Service (DDos) Attacks:

71
Q

is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge

A

Rootkits:

72
Q

is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.

A

E-mail spam

73
Q

is the act of using e-mail fraudulently to try to get the recipient to reveal personal data

A

. Phishing

74
Q

is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the
attacker.

A

Ransomware

75
Q

A person who carries out a harmful, illegal, or immoral act, is called perpetrators.

A

Perpetrators

76
Q

They test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

A

Hackers:

77
Q

They break into other people’s networks and systems to cause harm such as defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.

A

Crackers:

78
Q

They are extremely difficult to detect or stop because they are often authorized to access the very systems they abuse.

A

Malicious Insiders:

79
Q

They use illegal means to obtain trade secrets from competitors of their sponsor

A

Industrial Spies

80
Q

They are engaged in all forms of computer fraud: stealing and reselling credit card numbers, personal identities, and cellphone IDs.

A

Cybercriminals:

81
Q

Hacktivism is a combination of the words “hacking” and “activism.” This is done to achieve political or social goal.

A

Hacktivists and Cyberterrorists:

82
Q

A firewall stands as guard between an organization’s internal network and the Internet. It also limits network access based on the organization’s access policy.

A

Installing a corporate firewall

83
Q

These work to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.

A

Intrusion prevention systems (IPSs

84
Q

scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of specific viruses. If it finds a virus, the antivirus software informs the user, and it may clean, delete, or quarantine any files, directories, or disks affected by the malicious codes

A

Antivirus software

85
Q

Organizations need to define employee roles carefully and separate key responsibilities properly so that a single person is not responsible for accomplishing a task that has high security

A

Implementing safeguards against attacks by malicious insiders

86
Q

The actions required to address these issues include installing a known patch to the software and keeping applications and operating systems up to date. Those responsible for computer security must make it a priority to prevent attacks using these vulnerabilities.

A

Addressing the most critical internet security threats

87
Q

Security audit is a prevention tool that evaluates whether an organization has a well-considered security policy in place and if it is being followed (e.g., password policy, system access, and level of authority).

A

Conducting periodic IT security audits

88
Q

is a branch of forensic science which deals with the application of investigative analysis techniques on computers in order to retrieve and preserve evidence in a way that is legally admissible. This means that a major aspect of the science of computer forensics lies in the ability of the forensics expert to present findings in a way that is acceptable and usable by a court of law

A

Computer forensics

89
Q

Confidentiality safeguards are intended to prevent unauthorized information disclosure.

A

Confidentiality

90
Q

Data consistency includes safeguarding against unauthorized changes (additions, deletions, alterations, and so on). The integrity principle ensures that data is accurate and reliable, and that it is not incorrectly modified, whether accidentally or maliciously.

A

Integrity

91
Q

The information must be present when needed. The protection of a system’s ability to make software systems and data fully available when a user requires it is known as availability (or at a specified time).

A

Availability

92
Q

CIA TRIAD

A

integrity, confidentiality, availability,

93
Q

Cybercrime Prevention Act of 2012” (CPA) was approved, which is the comprehensive legislation on cybercrimes. Notably, it defined “cybersecurity” as the “application of security measures to ensure confidentiality, integrity, and availability of data.

A

Republic Act No. 10175

94
Q

It establishes the relationship of the individual to the State and defines the rights of the individual by limiting the lawful powers of the State.

A

Article III of the Philippine Constitution

95
Q

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

A

The Fourth Amendment is as follows:

96
Q

the combination of communications privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy (the ability to limit access to one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and their use).

A

Information Privacy

97
Q

outlines a number of legislative acts that affect a person’s privacy. Note that most of these actions address invasion of privacy by the government. Legislation that protects people from data privacy abuses by corporations is almost nonexistent.

A

Privacy Laws, Applications, and Court Rulings

98
Q

Individuals must reveal much of their personal financial data in order to take advantage of the wide range of financial products and services available, including credit cards, checking and savings accounts, loans, payroll direct deposit, and brokerage accounts. The inadvertent loss or disclosure of this personal financial data carries a high risk of loss of privacy and potential financial loss.

A

Financial Data

99
Q

regulates the operations of credit-reporting bureaus, including how they collect, store, and use credit information. The act, enforced by the U.S. Federal Trade Commission, is designed to ensure the accuracy, fairness, and privacy of information gathered by the credit-reporting companies and to check those systems that gather and sell information about people

A

Fair Credit Reporting Act (1970)

100
Q

protects the records of financial institution customers from unauthorized scrutiny by the federal government.

A

Right to Financial Privacy Act (1978)

101
Q

Individuals are rightly concerned about the erosion of privacy of data concerning their health. They fear intrusions into their health data by employers, schools, insurance firms, law enforcement agencies, and even marketing firms looking to promote their products and services.

A

Health Information

102
Q

was designed to improve the portability and continuity of health insurance coverage; to reduce fraud, waste, and abuse in health insurance and healthcare delivery; and to simplify the administration of health insurance.

A

Health Insurance Portability and Accountability Act (HIPAA) (1996)

103
Q

According to the Center for Media Research, teens spend over five hours per week surfing the Web, and over 40 percent of them claim that their parents have no idea what they are looking at online. Many people feel that there is a need to protect children from being exposed to inappropriate material and online predators; becoming the target of harassment; divulging personal data; and becoming involved in gambling or other inappropriate behavior.

A

Children’s Personal Data

104
Q

is a federal law that assigns certain rights to parents regarding their children’s educational records. These rights transfer to the student once the student reaches the age of 18 or if he or she attends a school beyond the high school level.

A

Family Educational Rights and Privacy Act (1974)

105
Q

any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age.

A

Children’s Online Privacy Protection Act (1998)

106
Q

This laws address government surveillance, including various forms of electronic surveillance. New laws have been added and old laws amended in recent years in reaction to worldwide terrorist activities and the development of new communication technologies.

A

Electronic Surveillance

107
Q

The Communications Act established the Federal Communications Commission and gave it responsibility for regulating all non-federal-government use of radio and television broadcasting and all interstate telecommunications as well as all international communications

A

Communications Act (1934)

108
Q

deals with three main issues: (1) the protection of communications while in transfer from sender to receiver; (2) the protection of communications held in electronic storage; and (3) the prohibition of devices from recording dialing, routing, addressing, and signaling information without a search warrant.

A

Electronic Communications Privacy Act (1986)

109
Q

Electronic Communications Privacy Act (1986) deals with 3 issues:

A

(1) the protection of communications while in transfer from sender to receiver; (2) the protection of communications held in electronic storage; and (3) the prohibition of devices from recording dialing, routing, addressing, and signaling information without a search warrant.

110
Q

is a term for a set of guidelines that govern the collection and use of personal data. The overall goal of such guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data.

A

Fair Information Practices

111
Q

The government has a great capacity to store data about each and every one of us and about the proceedings of its various organizations. The Freedom of Information Act enables the public to gain access to certain government records, and the Privacy Act prohibits the government from concealing the existence of any personal data recordkeeping systems.

A

Access to Government Records

112
Q

establishes a code of fair information practices that sets rules for the collection, maintenance, use, and dissemination of personal data that is kept in systems of records by federal agencies.

A

Privacy Act (1974)

113
Q

Companies openly collect personal information about users when they register at Websites, complete surveys, fill out forms, or enter contests online. Many companies also obtain information about Web surfers through the use of cookies—text files that can be downloaded to the hard drives of users who visit a Web site, so that the Web site is able to identify visitors on subsequent visits.

A

Consumer Profiling

114
Q

is the unintended release of sensitive data or the access of sensitive data (e.g., credit card numbers, health insurance member ids, and Social Security numbers) by unauthorized individuals.

A

data breach

115
Q

is the theft of personal information, which is then used without the owner’s permission. Often, stolen personal identification information, such as a person’s name, Social Security number, or credit card number, is used to commit fraud or other crimes. Thieves may use a consumer’s credit card number to charge items to that person’s account, use identification information to apply for a new credit card or a loan in a consumer’s name, or use a consumer’s name and Social Security number to obtain government benefits. Thieves also often sell personal identification information on the black market

A

Identity theft

116
Q

A number of advances in information technology—such as surveillance cameras and satellite-based systems that can pinpoint a person’s physical location—provide amazing new data-gathering capabilities. However, these advances can also diminish individual privacy and complicate the issue of how much information should be captured about people’s private lives.

A

Advanced Surveillance Technology

117
Q

Technology has made it easy for a person to track the whereabouts of someone else at all times, without ever having to follow the person. Cell phone spy software called a stalking app can be loaded onto someone’s cell phone or smartphone within minutes, making it possible for the user to perform location tracking, record calls, view every text message or picture sent or received, and record the URLs of any website visited on the phone. A built-in microphone can be activated remotely to use as a listening device even when the phone is turned off.

A

Stalking Apps

118
Q

is the concept of ensuring proper use of personal data by giving individuals control over how their data is accessed, used, or shared.

A

Data privacy

119
Q

keeps that data safe from unauthorized access.

A

data security

120
Q

AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES

A

REPUBLIC ACT NO. 10173
This Act shall be known as the “Data Privacy Act of 2012”.