OVERALL ETHICS Flashcards
SKILL (43 cards)
MALWARE STOPS USE OF COMPUTER TO ACCESS DATA UNTIL DEMAND MET A TYPE OF EXPLOIT
RANSOMEWEAR
FILE RESIDES IN ACTIVE MEMORY AND DUPLICATES A TYPE OF EXPLOIT
WORMS
PROGRAM CODE CAUSES COMPUTERS TO BEHAVE IN UNEXPECTED MANOR A TYPE OF EXPLOIT
VIRUS
SEAMINGLY HARMLESS PROGRAM WITH MALICIOUS CODE HIDDEN TYPE OF EXPLOIT
TROJAN HORSE
COMBINATION OF MANY TYPES OF EXPLOITS
BLENDED THREAT
PROGRAM ALLOWING ADMIN LEVEL ACCESS TO COMPUTERS AND SERVERS TYPE OF EXPLOIT
ROOTKIT
TYPE OF EXPLOIT THAT TAKES OVER COMPUTER VIA INTERNET
DDOS DISTRIBUTED DENIAL OF SERVICE
TYPE OF EXPLOIT THAT IS UNSOLICITED EMAILS
SPAM
TYPE OF EXPLOIT THAT IS A PERSISTEN THREAT ATTACKER GAINS ACCESS TO NETWORK UNDETECTED
APT - ADVANCED PERSISTENT THREAT
TYPE OF EXPLOIT THAT GETS EMAILS PERSONAL DATA
PHISING
TYPE OF EXPLOIT THAT SENDS FRAUDALENT EMAILS TO ORGANIZATIONS/EMPLOYEES
SPEARPHISING
TYPE OF EXPLOIT THAT USES TEXTING A VARIATION OF PHISING
SMISHING
TYPE OF EXPLOIT THAT USES VOICE MAIL VARIATION OF PHISING
VISHING
TYPE OF EXPLOIT THAT STEALS INFO FROM GOV’T MILITARY, CONTRACTOR, POLITICAL
CYBERESPIONAGE
TYPE OF EXPLOIT THAT DESTROYS INFRASTRUCTURE OF GOV’T, FINANCIAL, CORPORATION, UTILITIES
CYERTERRIOISM
TYPE OF EXPLOIT CONTROLS LARGE GROUP OF COMPUTERS BY ONE OR MORE REMOTE LOCATIONS BY A HACKER
BOTNET
USED TO CONTROL ASSAULT OF NON SOLICITED PORNOGRAPH AND MARKETING
CAN-SPAM
AUTOMATED SYSTEM TO DESTINCT BETWEEN COMPUTER AND HUMAN
CAPTCHA
WHAT ARE SOME OF THE CHARACTERISTICS OF ORGANIZATIONAL PROFESSIONAL
KNOWLEDGE, AUTHORITY, CLIENTS, JUDGEMENTS, UNIQUIE PRIVILEDGES, CODE OF ETHICS, OWN CULTURE
WHICH FRAMEWORK IS BASED ON MORALS, CODE OF CONDUCT
DEONTOLOGY
WHICH FRAMEWORK IS BASED ON ETHICS OF GOOD OR BAD/PERSON’S CHARACTER
VIRTURE
WHICH FRAMEWORK IS BASED ON BUIDLING SUPPORT AND TRUST AND INTERDEPENDECY
COMMUNIALISM
WHICH FRAMEWORK IS BASED ON GREATEST GOOD FOR GREATEST NUMBER
UTILITARISM
NAME THREE ADDITIONAL FRAMEWORKS THAT HAVE BEEN RECENTLY ADDED
CAPIABILITY, FEMINISM, RESPONSIBILITY