WGU D333 Ethics in Technology - Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/267

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards derived from key terms and definitions in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

268 Terms

1
New cards

acceptable use policy (AUP)

A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources.

2
New cards

acceptance

When an organization decides to accept a risk because the cost of avoiding the risk outweighs the potential loss of the risk.

3
New cards

advanced persistent threat (APT)

A network attack in which an intruder gains access to a network and stays there undetected with the intention of stealing data over a long period of time.

4
New cards

agile development

A software development methodology in which a system is developed in iterations lasting from one to four weeks, accepting evolving requirements.

5
New cards

Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS)

A WTO agreement that requires member governments to enforce intellectual property rights and deter infringement through penalties.

6
New cards

American Recovery and Reinvestment Act (ARRA)

An act authorizing 787 billion in spending and tax cuts over 10 years with privacy provisions for electronic health records and patient rights of access.

7
New cards

annualized loss expectancy (ALE)

The estimated loss from a potential risk event over a year; ALE = ARO × SLE.

8
New cards

annualized rate of occurrence (ARO)

An estimate of the probability that a risk event will occur over the course of a year.

9
New cards

anonymous expression

The expression of opinions by people who do not reveal their identity.

10
New cards

anonymous remailer service

A service that allows anonymity by stripping headers and IP addresses and forwarding the message.

11
New cards

anti-SLAPP laws

Laws designed to reduce frivolous strategic lawsuits against public participation.

12
New cards

antivirus software

Software that scans for virus signatures to detect malware.

13
New cards

artificial intelligence systems

Systems that simulate human intelligence processes including learning, reasoning, and self-correction.

14
New cards

audit committee

A group that assists the board in overseeing accounting, reporting, compliance, and auditor independence.

15
New cards

avoidance

Eliminating a vulnerability to avoid a risk, often the most effective solution but not always possible.

16
New cards

Bathsheba syndrome

Moral corruption of power where leaders act inappropriately and others look the other way.

17
New cards

best practice

A method that consistently yields superior results and is used as a benchmark in an industry.

18
New cards

Bill of Rights

The first 10 amendments to the U.S. Constitution outlining individual rights.

19
New cards

black-box testing

Dynamic testing where the internal workings are unknown and only inputs and outputs are observed.

20
New cards

blended threat

A sophisticated threat combining features of multiple malware types into one payload.

21
New cards

body of knowledge

An agreed-upon set of skills and abilities that licensed professionals must possess.

22
New cards

botnet

A large group of computers controlled from remote locations by hackers.

23
New cards

breach of contract

The failure of one party to meet the terms of a contract.

24
New cards

breach of the duty of care

The failure to act as a reasonable person would act.

25
New cards

breach of warranty

When a product fails to meet the terms of its warranty.

26
New cards

bribery

Providing money or favors to obtain a business or government advantage.

27
New cards

bring your own device (BYOD)

A policy that allows employees to use their own devices to access company resources.

28
New cards

BSA The Software Alliance

A trade group representing software and hardware manufacturers.

29
New cards

business continuity plan

A risk based plan including evacuation, operations continuity, and incident management to minimize impact of security incidents.

30
New cards

business information system

A set of interrelated components that collect, process, and disseminate data.

31
New cards

Capability Maturity Model Integration (CMMI)

A collection of best practices to help organizations improve processes.

32
New cards

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart; tests that humans can pass but computers typically cannot.

33
New cards

certification

Indicates a professional possesses a certain set of skills or that a product meets standards; often voluntary.

34
New cards

Child Online Protection Act (COPA)

An act aimed at prohibiting harmful material to minors, largely struck down as unconstitutional.

35
New cards

Children's Internet Protection Act (CIPA)

An act requiring filters to block obscene material in federally funded schools and libraries.

36
New cards

Children's Online Privacy Protection Act (COPPA)

An act to give parents control over the collection of children's personal information online.

37
New cards

CIA security triad

Confidentiality, integrity, and availability.

38
New cards

clinical decision support (CDS)

Tools to enhance healthcare decision making using clinical knowledge and patient data.

39
New cards

CMMI-Development (CMMI-DEV)

CMMI used to assess and improve software development practices.

40
New cards

code of ethics

A statement of an organization's key ethical issues and guiding values.

41
New cards

coemployment relationship

An employment arrangement where two employers share rights and duties toward the same employee.

42
New cards

CALEA

An act requiring the telecom industry to build tools for lawful intercepts with court orders.

43
New cards

Communications Decency Act (CDA)

Legislation addressing indecent content on the Internet and penalties for violations.

44
New cards

compliance

Being in accordance with policies, guidelines, or laws.

45
New cards

computer forensics

A discipline combining law and computer science to collect and preserve data for legal admissibility.

46
New cards

computerized provider order entry (CPOE) system

An electronic system for physicians to place orders directly to recipients.

47
New cards

conflict of interest

A conflict between self-interest and the interests of a client.

48
New cards

contingent work

A job with no long-term employment contract.

49
New cards

contributory negligence

Plaintiffs' own actions contributed to their injuries.

50
New cards

CAN-SPAM

A law governing commercial email that sets requirements to avoid deceptive practices.

51
New cards

cookie

Text files downloaded to a user’s device to identify them on later visits.

52
New cards

copyright

The exclusive right to distribute, display, perform, and reproduce original works.

53
New cards

copyright infringement

Copying a substantial portion of a copyrighted work without permission.

54
New cards

corporate compliance officer

A senior manager guiding the organization on business conduct and compliance.

55
New cards

corporate ethics officer

A senior manager providing vision and leadership on ethics in business conduct.

56
New cards

corporate social responsibility (CSR)

The idea that organizations should act ethically and consider impact on stakeholders and society.

57
New cards

cost per click (CPC)

A paid media model where advertisers pay when users click an ad.

58
New cards

cost per thousand impressions (CPM)

A paid media model where advertisers are billed per 1000 impressions regardless of clicks.

59
New cards

cyberabuse

Mistreatment or harm via electronic communications.

60
New cards

cyberespionage

Malware used to secretly steal data from organizations.

61
New cards

cyberharassment

Cyberbullying or harassing behavior conducted through electronic means.

62
New cards

cyberloafing

Using the Internet for nonwork activities at work.

63
New cards

cybersquatter

Registering domain names of famous brands to resell at a higher price.

64
New cards

cyberstalking

Threatening or unwanted online advances toward an adult.

65
New cards

cyberterrorism

Using information technology to intimidate to achieve political or ideological goals.

66
New cards

decision support system (DSS)

A business information system to aid decision making.

67
New cards

defamation

A harmful false statement either spoken or written.

68
New cards

Defend Trade Secrets Act of 2016

Federal civil remedy for trade secret misappropriation.

69
New cards

deliverable

Products or documents produced during development stages.

70
New cards

Department of Homeland Security (DHS)

A federal agency tasked with safeguarding the nation from threats.

71
New cards

design patent

A patent that protects the ornamental design of a functional item.

72
New cards

Digital Millennium Copyright Act (DMCA)

Law addressing copyright issues with provisions limiting ISP liability.

73
New cards

disaster recovery plan

A documented process for recovering IT assets after a disaster.

74
New cards

distributed denial-of-service (DDoS) attack

An attack where compromised devices flood a target with traffic to disrupt service.

75
New cards

Doxing

Researching and posting private information about a person online without permission.

76
New cards

duty of care

The obligation to protect people from unreasonable harm.

77
New cards

dynamic testing

QA testing by executing code with test data to compare results.

78
New cards

earned media

Media exposure gained through PR and online activity rather than paid advertising.

79
New cards

Economic Espionage Act (EEA) of 1996

An act to deter and punish theft of trade secrets with penalties for violations.

80
New cards

Electronic Communications Privacy Act (ECPA)

Law protecting communications in transit and stored electronic communications.

81
New cards

electronic discovery (e-discovery)

Collecting and producing electronically stored information for legal actions.

82
New cards

electronic health record (EHR)

A comprehensive, shareable view of a patient’s medical history across organizations.

83
New cards

electronic medical record (EMR)

Health information stored within a single organization’s system.

84
New cards

EPEAT

System for evaluating environmental criteria for electronic products.

85
New cards

electronically stored information (ESI)

Digital information including emails, files, and databases stored electronically.

86
New cards

employee leasing

A business arrangement where a firm leases employees from a leasing firm.

87
New cards

encryption

Scrambling data so that only authorized parties can read it.

88
New cards

encryption key

A value used to transform plaintext into ciphertext and back again.

89
New cards

ethics

A code of behavior defined by a group or organization.

90
New cards

European Union Data Protection Directive

Directive requiring privacy protections and rights for individuals in the EU.

91
New cards

exploit

An attack that takes advantage of a vulnerability in a system.

92
New cards

failure mode

A description of how a product or process could fail to perform.

93
New cards

FMEA

Failure Mode and Effects Analysis; a technique for reliability and quality assessment.

94
New cards

Fair and Accurate Credit Transactions Act

Requires free annual credit reports from major bureaus.

95
New cards

Fair Credit Reporting Act

Regulates how credit bureaus collect, store, and use information.

96
New cards

fair information practices

Guidelines governing collection and use of personal data.

97
New cards

fair use doctrine

Allows limited use of copyrighted material under defined circumstances.

98
New cards

False Claims Act

A law to combat fraud against the government with qui tam provisions.

99
New cards

FERPA

Family Educational Rights and Privacy Act protecting student records.

100
New cards

firewall

A barrier that controls traffic between networks based on policy.