Organizational Structures That Support Strategic Initiatives

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
full-widthPodcast
1
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts related to organizational structures, information ethics, information security, and their implications for strategic initiatives.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

32 Terms

1
New cards

Ethics

The principles and standards that guide our behavior toward other people.

2
New cards

Confidentiality

The assurance that messages and information remain available only to those authorized to view them.

3
New cards

Privacy

The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

4
New cards

Intellectual Property

An ethical issue involving the rights associated with creations of the mind, including inventions, literary and artistic works.

5
New cards

Copyright

The legal right that grants the creator of original works exclusive rights to use and distribute their creation.

6
New cards

Digital Rights Management

Technologies used to control the use of digital content and devices after the initial sale.

7
New cards

Hacker

An expert in technology who uses their knowledge to break into computers and networks for various motives.

8
New cards

White-hat hacker

An ethical hacker who uses their skills to improve security by finding and fixing vulnerabilities.

9
New cards

Black-hat hacker

A malicious hacker who exploits systems for personal gain or malicious intent.

10
New cards

Virus

Software designed with malicious intent to cause annoyance or damage to a system.

11
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system.

12
New cards

Ransomware

A type of malware that demands payment to restore access to files or systems.

13
New cards

Cybersecurity

Measures and practices designed to protect computers and networks from digital attacks.

14
New cards

Data Scraping

The process of extracting large amounts of data from websites.

15
New cards

Information Governance

A system of decision rights and responsibilities for information-related processes.

16
New cards

Information Compliance

The act of conforming to laws, regulations, and policies regarding information.

17
New cards

Information Management

The process of collecting, storing, and utilizing information efficiently and effectively.

18
New cards

Authentication

A method for confirming users’ identities in information security.

19
New cards

Authorization

The process of giving someone permission to do or have something.

20
New cards

Phishing

A technique used to gain personal information for identity theft, typically via fraudulent emails.

21
New cards

Cyberattack

Malicious attempts to access or damage a computer system.

22
New cards

Denial-of-Service (DoS) Attack

An attack aimed at making a computer resource unavailable to its intended users.

23
New cards

Encryption

The process of converting information into code to prevent unauthorized access.

24
New cards

Firewall

A network security system designed to monitor and control incoming and outgoing network traffic.

25
New cards

Spam

Unsolicited or junk email, typically sent in bulk for advertising purposes.

26
New cards

Privilege Escalation

An attack that exploits a bug or design flaw to gain elevated access.

27
New cards

Social Engineering

Manipulation techniques that exploit human psychology to gain confidential information.

28
New cards

Botnet

A network of infected computers controlled by a single attacking party.

29
New cards

Clickstream Data

Data generated when users navigate through a website, tracking their behavior and interactions.

30
New cards

Business-to-Consumer (B2C)

A model where businesses sell products or services directly to consumers.

31
New cards

Web 2.0

A term referring to the second generation of the internet, focusing on user-generated content and interactivity.

32
New cards

Web 3.0

The semantic web version which emphasizes data connectivity and machine learning.