it ethics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

(InfoSec) information

Manages processes, tools, and policies to prevent, detect, document and counter threats.

2
New cards

white hat hacker vs Black hat hacker

White hat hackers: Legally hack into systems usually hired through a company

Black hat hacker: Illegally hacking

3
New cards

regular security audits

ensure policy compliance

4
New cards

information privacy

combination of communication privacy and and data privacy

5
New cards

fair information practices

designed for organizations to govern the collection and use of personal information. They aim to protect individuals' privacy rights while ensuring responsible data handling by organizations.

6
New cards

EU Data Protection Directive

similar to GDPR, first in the EU

7
New cards

gramm-leach-biley act (GLBA)

Guidlines for the collection and disclosure of personal financial information by financial institutions

8
New cards

Electronic communications privacy act

Protects your electronic communications (e.g emails,phones,text) without a warrant

9
New cards

USA PATRIOT act

It gives law enforcement the ability to eavesdrop and collect data for national security purposes, expanding surveillance capabilities to prevent

10
New cards

oecd. (organization for economic co-operation and development guidlines)

38 countries promoting responsible data management practices among member countries, economic growth, improvement in living standards

11
New cards

EU-U.S Privacy Shield

when EU and U.S. companies transfer personal data of EU citizens to the United States, ensuring adequate data protection standards.

12
New cards

Information privacy

the right of individuals to control the collection and use of their personal information. combination of communication + data privacy

13
New cards

privacy act

A law that regulates the collection, use, and dissemination of personal information by federal government agencies, ensuring individuals' privacy rights.

14
New cards

predective coding

An AI tool that can break down large amounts of data

15
New cards

name the differene

Child ONLINE protection act

Children INTERNET protection act

Communication decency act

Children online protection act: Prohibits the use of the Internet to harm minors and sets restrictions on websites that cater to children.

Children Internet Protection Act: Requires schools and libraries to adopt internet safety policies and filter content to protect children from harmful online content.

Communication decency act: child pornography protection

16
New cards

John doe lawsuit

A legal action that allows individuals to sue anonymously, often used in privacy-related cases to protect the identity of the plaintiff. + reveals internet users causing harm to an organization

17
New cards

WTO ( world trade organization)

helps the world trade with each other fairly and improves trade relations between countries.

18
New cards

General agreement on tariffs and trade (GATT/TRIPS)

Making international trade cheaper, fair and less restricted

19
New cards

open-source

edible programming codes (e.g java and python)

20
New cards

competitive intelligence

gathering and analysis of information about competitors to enhance a company's strategic position in the market.

21
New cards

industrial espoinage.

collecting confidential information about competitors illegally or through unethical means, often to gain a business advantage.

22
New cards

cyber espoinage

Tusing technology to gain unauthorized access to confidential information held by individuals or organizations, often for political or economic gain.

23
New cards

Black box, White box, static testing, Unit testing

Black box testing: Testing the software from the user's perspective only concerned with how it looks from the user perspective

white box: what going on internally in software or code ( e.g learning chat GPT by learning how it coded )

Static testing: instead of running the code, you examine it to identify any issues before executing the code

unit testing: The process of testing individual components or modules of software to ensure they work correctly in isolation, often conducted by developers.

interrogation testing: testing units that are combined that already went through integration testing: evaluating the interactions between combined units to verify that they function together as intended.

24
New cards

user acceptance testing

testing if a program is satisfactory for end users, ensuring it meets their needs and requirements before final deployment.

25
New cards

ISO9000

guidelines for quality management

26
New cards

ISO9001

specific rules to get certified in quality management