1/31
These flashcards cover key terms and concepts related to organizational structures, information ethics, information security, and their implications for strategic initiatives.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Ethics
The principles and standards that guide our behavior toward other people.
Confidentiality
The assurance that messages and information remain available only to those authorized to view them.
Privacy
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Intellectual Property
An ethical issue involving the rights associated with creations of the mind, including inventions, literary and artistic works.
Copyright
The legal right that grants the creator of original works exclusive rights to use and distribute their creation.
Digital Rights Management
Technologies used to control the use of digital content and devices after the initial sale.
Hacker
An expert in technology who uses their knowledge to break into computers and networks for various motives.
White-hat hacker
An ethical hacker who uses their skills to improve security by finding and fixing vulnerabilities.
Black-hat hacker
A malicious hacker who exploits systems for personal gain or malicious intent.
Virus
Software designed with malicious intent to cause annoyance or damage to a system.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer system.
Ransomware
A type of malware that demands payment to restore access to files or systems.
Cybersecurity
Measures and practices designed to protect computers and networks from digital attacks.
Data Scraping
The process of extracting large amounts of data from websites.
Information Governance
A system of decision rights and responsibilities for information-related processes.
Information Compliance
The act of conforming to laws, regulations, and policies regarding information.
Information Management
The process of collecting, storing, and utilizing information efficiently and effectively.
Authentication
A method for confirming users’ identities in information security.
Authorization
The process of giving someone permission to do or have something.
Phishing
A technique used to gain personal information for identity theft, typically via fraudulent emails.
Cyberattack
Malicious attempts to access or damage a computer system.
Denial-of-Service (DoS) Attack
An attack aimed at making a computer resource unavailable to its intended users.
Encryption
The process of converting information into code to prevent unauthorized access.
Firewall
A network security system designed to monitor and control incoming and outgoing network traffic.
Spam
Unsolicited or junk email, typically sent in bulk for advertising purposes.
Privilege Escalation
An attack that exploits a bug or design flaw to gain elevated access.
Social Engineering
Manipulation techniques that exploit human psychology to gain confidential information.
Botnet
A network of infected computers controlled by a single attacking party.
Clickstream Data
Data generated when users navigate through a website, tracking their behavior and interactions.
Business-to-Consumer (B2C)
A model where businesses sell products or services directly to consumers.
Web 2.0
A term referring to the second generation of the internet, focusing on user-generated content and interactivity.
Web 3.0
The semantic web version which emphasizes data connectivity and machine learning.