CIS Ch. 13
Terms
undefined, object
copy deck
- Distributed Denial of Service
- Overwhelming a website with requests for service from captive computers
- Computer monitoring
- Using computers to monitor the behavior and productivity of workers on the job and in the workplace
- biometric security
- A fast growing area of computer security. These are security measures provided by computer devices that measure physical traits that make each individual unique,
- Spyware/Adware
- SOftwre that can infect a machine and transmit private information back to its owner.
- Hacking
- Obsessive use of a computer. ZThe unauthorized access and use of computer systems
- Business Ethics
- An area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making
- Fault Tolerant
- Computers that have multiple central processors, peripherals, and system software and that are able to continue operations even if there is a major hardware or software failure.
- computer virus
- Program code that copies its destructive program routines into the computer systems of anyone who accesses computer systems that have used the program, or anyone who uses copies of data and programs taken from such computers This spreads the destruction of data and programs among many computer users Technically, a virus will not run unraided, but must be inserted into another program, while a worm is a distinct program that can run unaided
- System Security Monitor
- Software that can control access and use of a computer system.
- Ergonomics
- The science and technology emphasizing the safety, comfort, and ease of use of human-operated machines such as computers. The goal of ergonomics is to produce systems that are user friendly:safe, comfortable, and easy to use. Ergonomics is also called human factors.
- audit trail
- The presence of media and procedures that allow a transaction to be traced through all stages of information processing, beginning with its appearance on a source document and ending with its transformation into information on a final output document.
- Cyberlaw
- Laws and regulation focused on issues related to the Internet and other forms of networked communications.
- backup files
- Duplicate files of data or programs, another important security measure.
- Opt-In/Opt-Out
- Two different Perspectives on the use of private information.
- Disaster Recovery
- Methods for ensuring that an organization recovers from natural and human-caused disasters that have affected its computer based operations.
- Firewall
- Computers, communications processors, and software that protect computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other networks.
- Security management
- Protecting the accuracy, integrity, and safety of the processes and resources of an internetorked e-business enterprise against computer crime, accidental or malicious destruction, and natural disasters, using securtiy measures such as encryption, firewalls, antivirus software, fault tolerant computers, and security monitors.
- Encryption
- to Scramble data or convert them, prior to transmission, to a secret code that masks the meaning of the data to unauthroized recipients. Similar to enciphering.
- Flaming
- Sending extremely critical, derogatory, and vulgar e-mail messages.
- Ethical Foundations
- Ethical choices may result from decision making processes, cultural values, or behavioral stages.
- Computer Crime
- Criminal actions accomplished through the use of computer systems, especially with intent to defraud, destroy, or make unauthorized use of computer system resources
- Software piracy
- Unauthorized copying of software
- Information Systems Control
- Control totals, error signals, backup files, and security codes are examples.
- Intellectual property theft
- Unauthorized copying of software.
- unauthorized Use
- Usine company computers to access the Internet during work hours for personal business.
- Spamming
- Sending unsolicited e-mail discriminately.
- Computer Matching
- Using computers to screen and match the data about individual characteristics provided by a variety of computer based information systems and databases in order to identify individuals for business, government, or other proposes