IFMG 300 Exam 2 Ch 4,5,6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

downtime

Refers to a period of time when a system is unavailable

anti-spam policy

Simply states that email users will not send unsolicited emails (or spam)

threat

an act or object that poses a danger to assets

patent

an exclusive right to make or sell an invention granted by a government to the inventor

cyberattacks

malicious attempts to access or damage a computer system

Nonrepudiation

A contractual stipulation to ensure that ebusiness participants do not deny their online actions

Child Online Protection Act (COPA)

A law that protects minors from accessing inappropriate material on the Internet.

General Data Protection Regulation (GDPR)

A legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU)

opt in

A user can opt in to receive emails by choosing to allow permissions to incoming emails

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

social media policy

Outlines the corporate guidelines or principles governing employee online communications

privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

Information Security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

competitive click-fraud

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

Fair Information Practices

a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

social media manager

a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand

Acceptable Use Policy (AUP)

a policy that a user must agree to follow to be provided access to corporate email, information systems, and the internet

Typosquatting

a problem that occurs when someone registers purposely misspelled variations of well-known domain names

Digital Rights Management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

Bring Your Own Device (BYOD)

allows employees to use their personal mobile devices and computers to access enterprise data and applications

the right to be forgotten

allows individuals to request to have all content that violates their privacy removed

Teergrubing

anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

Cybersecurity and Infrastructure Security Agency (CISA)

builds the national capacity to defend against cyberattacks and works with the federal government to provide cybersecurity tools, incident response services, and assessment capabilities to safeguard the ".gov" networks that support the essential operations of partner departments and agencies.

information privacy policy

contains general principles regarding information privacy

ethical computer use policy

contains general principles to guide computer user behavior

Internet use policy

contains general principles to guide the proper use of the internet

opt out

customer specifically chooses to deny permission of receiving emails

email privacy policy

details the extent to which email messages may be read by others

Internet Censorship

government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens

Cyberbullying

includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website

intellectual property

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

Epolicies

policies and procedures that address information management along with the ethical use of computers and the internet in the business environment

Ediscovery (electronic discovery)

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

mail bomb

sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning

counterfeit software

software that is manufactured to look like the real thing and sold as such

employee monitoring policy

states explicitly how, when, and where the company monitors its employees

Physical Security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

Confidentiality

the assurance that messages and information are available only to those who are authorized to view them

Cybervandalism

the electronic defacing of an existing website

copyright

the legal protection afforded an expression of an idea, such as a song, book, or video game

Digital Trust

the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals

Rule 41

the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence

click fraud

the practice of artificially inflating traffic statistics for online advertisements

Ethics

the principles and standards that guide our behavior towards other people

data scraping

the process of extracting large amounts of data from a website and saving it to a spreadsheet or computer

social media monitoring

the process of monitoring and responding to what is being said about a company, individual, product, or brand

website name stealing

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

workplace MIS monitoring

tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

spam

unsolicited email


Ensembles d'études connexes

ENTR 182 Ch 17 & 8 Quiz Studyguide

View Set

CHAPTER 7 - LEGAL DIMENSIONS OF NURSING PRACTICE

View Set

Spanish 2, ¿Cuál es la pregunta?, Lesson 9.3

View Set

Organic Chemistry 2 Chapter 19 ALL Questions (all 19.1 and 19.2 D Quiz 1/1)

View Set

Sanlier-Oxford Vocabulary Workshop Level A - Unit 13 - Antonyms

View Set

Comparative Government: Differences between America and Britain

View Set

Chapter 8 Texas Laws and Rules Pertinent to Insurance

View Set

Cog Psych - Week 5 - Declarative, Semantic and Episodic Memory

View Set

2nd Year HVAC - Chapter 21 Metering Devices

View Set

Investments Final Review Quiz Questions - Kiseo Chung

View Set

3.4 ValuingCashFlowsatDifferentPointsinTime

View Set

Unit 5- Pharmacological and Parenteral Therapies

View Set