OVERALL ETHICS Flashcards

SKILL (43 cards)

1
Q

MALWARE STOPS USE OF COMPUTER TO ACCESS DATA UNTIL DEMAND MET A TYPE OF EXPLOIT

A

RANSOMEWEAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FILE RESIDES IN ACTIVE MEMORY AND DUPLICATES A TYPE OF EXPLOIT

A

WORMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PROGRAM CODE CAUSES COMPUTERS TO BEHAVE IN UNEXPECTED MANOR A TYPE OF EXPLOIT

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SEAMINGLY HARMLESS PROGRAM WITH MALICIOUS CODE HIDDEN TYPE OF EXPLOIT

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COMBINATION OF MANY TYPES OF EXPLOITS

A

BLENDED THREAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PROGRAM ALLOWING ADMIN LEVEL ACCESS TO COMPUTERS AND SERVERS TYPE OF EXPLOIT

A

ROOTKIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TYPE OF EXPLOIT THAT TAKES OVER COMPUTER VIA INTERNET

A

DDOS DISTRIBUTED DENIAL OF SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TYPE OF EXPLOIT THAT IS UNSOLICITED EMAILS

A

SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TYPE OF EXPLOIT THAT IS A PERSISTEN THREAT ATTACKER GAINS ACCESS TO NETWORK UNDETECTED

A

APT - ADVANCED PERSISTENT THREAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TYPE OF EXPLOIT THAT GETS EMAILS PERSONAL DATA

A

PHISING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TYPE OF EXPLOIT THAT SENDS FRAUDALENT EMAILS TO ORGANIZATIONS/EMPLOYEES

A

SPEARPHISING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TYPE OF EXPLOIT THAT USES TEXTING A VARIATION OF PHISING

A

SMISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TYPE OF EXPLOIT THAT USES VOICE MAIL VARIATION OF PHISING

A

VISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TYPE OF EXPLOIT THAT STEALS INFO FROM GOV’T MILITARY, CONTRACTOR, POLITICAL

A

CYBERESPIONAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TYPE OF EXPLOIT THAT DESTROYS INFRASTRUCTURE OF GOV’T, FINANCIAL, CORPORATION, UTILITIES

A

CYERTERRIOISM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TYPE OF EXPLOIT CONTROLS LARGE GROUP OF COMPUTERS BY ONE OR MORE REMOTE LOCATIONS BY A HACKER

A

BOTNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

USED TO CONTROL ASSAULT OF NON SOLICITED PORNOGRAPH AND MARKETING

A

CAN-SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AUTOMATED SYSTEM TO DESTINCT BETWEEN COMPUTER AND HUMAN

19
Q

WHAT ARE SOME OF THE CHARACTERISTICS OF ORGANIZATIONAL PROFESSIONAL

A

KNOWLEDGE, AUTHORITY, CLIENTS, JUDGEMENTS, UNIQUIE PRIVILEDGES, CODE OF ETHICS, OWN CULTURE

20
Q

WHICH FRAMEWORK IS BASED ON MORALS, CODE OF CONDUCT

21
Q

WHICH FRAMEWORK IS BASED ON ETHICS OF GOOD OR BAD/PERSON’S CHARACTER

22
Q

WHICH FRAMEWORK IS BASED ON BUIDLING SUPPORT AND TRUST AND INTERDEPENDECY

23
Q

WHICH FRAMEWORK IS BASED ON GREATEST GOOD FOR GREATEST NUMBER

24
Q

NAME THREE ADDITIONAL FRAMEWORKS THAT HAVE BEEN RECENTLY ADDED

A

CAPIABILITY, FEMINISM, RESPONSIBILITY

25
FAILURE IN A SYSTEM THAT SHOWS A SECURITY BREACH OR VULNERABILITY
EXPLOIT
26
CYBERATTACK OCCURS BEFORE SECURITY BECOMES AWARE
ZERO DAY EXPLOIT
27
NAME DIFFERENT TYPES OF PERPETATORS OF COMPUTER CRIME
WHITE HAT, BLACK HAT, CRACKER, MALICIOUS INSIDER, INDUSTRIAL SPY, CYBERCRIMINAL, HACKTIVEST, CYBERTERRIOST
28
HIRED BY COMPANY TO TEST FOR SECUIRTY TYPE OF PERPETRATORS
WHITE HAT
29
TYPE OF PERPETRATOR THAT VIOLATES COMPUTER OR INTERNET SECURITY MALICIOUSLY FOR ILLEGAL PERSONAL GAINS
BLACK HAT
30
TYPE OF PERPETRATOR CAUSES PROBLEMS STEALS DATA CORRUPTS SYSTEM
HACKER
31
TYPE OF PERPETRATOR THAT IS EMPLOYEE OR CONTRACTOR GAINING FINANCIAL OR DISRUPTS INFO OR BUSINESS
MALICIOUS INSIDER
32
TYPE OF PERPETRATOR THAT CAPTURES TRADE SECRETS UNFAIR COMPETITIVE ADVANTAGE
INDUSTRIAL SPY
33
TYPE OF PERPETRATOR FOR FINANCIAL GAIN
CYBERCRIMINAL
34
TYPE OF PERPETRATOR HACKS TO PROMOTE POLITICVAL IDEOLOGY
HACKTIVEST
35
TYPE OF PERPETRATOR THAT DESTORYS INFRASTRUCTURE GOV'T FINANCIAL CORPORATE UTILITIES EMERGENCY RESPONSE
CYBERTERRIOST
36
any form of mistreatment or lack of care, both physical and mental, based on the use of an electronic communications device that causes harm and distress to others. ENCOMPASSES BOTH CYBERHARRASSMENT AND CYBERSTALKING JUST UNDER 50% US INTERNET USERS EXPERIENCE
CYBERABUSE
37
NAME SOME FORMS FOR CYBERABUSE
DEGRADING HUMILIATION HURTFUL INSULTING INTIMIDATING MALICIOUS OFFENCE
38
EMPLOYS TOOLS PROVIDE BY OR TAILORED FOR PARTICULAR SOCIAL MEDIA PLATOFRM TO BUILD SOCIAL COMMUNITY AND INTEREST BY SHARING POSTS AND RESPONDING TO CUSTOMER COMMENTS - ON DECLINE
ORGANIC MEDIA MARKETING
39
The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).
ARTIFICIAL INTELLIGENCE
40
NAME COMPLEXITY OF ARTIFICIAL INTELLIGENCE
MACHINE LEARNING ROBOTICS NATURAL LANGUAGE PROCESSING
41
computing system that can learn and reason based on interactions with humans, computer files, online interactions, and its environment
COGNITIVE COMPUTING SYSTEM
42
A branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings, such as painting cars or making precision welds.
ROBOTICS
43
An aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate “natural” languages, such as English.
NATURAL LANGUAGE