ETHICS

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/147

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:26 PM on 10/17/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

148 Terms

1
New cards

risk

________ is any possibility that something might occur resulting in an injury or a loss

2
New cards

digital security risk

__________ is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

3
New cards

types of digital security risks

_________ include threats to our information, physical health, mental health, and the environment

4
New cards

nation-state actors

State-sponsored attackers are employed by the government to launch computer attacks against their enemies through _________

5
New cards

cyberwarfare

_________ describes an attack whose goal ranges from disabling a government’s computer network to crippling a country

6
New cards

data mining

These attackers try to steal and then use your credit card numbers, online financial account information, or social security numbers using ________

7
New cards

data mining

___________ is the process of sifting through big data to find important questions that will yield fruitful results

8
New cards

cyber extortionist

___________ is an individual who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network.

9
New cards

social engineering

___________ is a category of attack that attempts to trick the victim into giving valuable information to the attacker.

10
New cards

hoaxes and phishing

Two examples of social engineering

11
New cards

computer crime

Any illegal act involving the use of a computer or related devices is generally referred to as a ___________

12
New cards

cybercrime

___________refers to online or internet-based illegal acts, such as distributing malicious software or committing identity theft.

13
New cards

crimeware

Software used by cybercriminal is called __________

14
New cards

cybersecurity

__________ is the practice of protection against digital threats, including unauthorized or illegal access to data.

15
New cards

digital or cyber forensics

____________ is the discovery, collection, and analysis of evidence found on computers and networks.

16
New cards

digital forensics examiner

________________ must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, familiarity with corporate structures and policies, a willingness to learn and update skills, and a knack for problem-solving

17
New cards

digital detox

_________ is a period of time during which an individual refrains from using technology.

18
New cards

threat actoor

________ is a more general and common term used to describe individuals who launch attcks against other users and their computers

19
New cards

dark web

___________ is a part of the web that is accessed using specialized software, where users and website operators can remain anonymous while performing illegal actions

20
New cards

script kiddies

__________ are individuals who want to attack computers

21
New cards

hacker

_______ is a person who intends to access a computer system without permission

22
New cards

cracker

________ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action

23
New cards

hacktivists

_________ are attackers who are strongly motivated by principles or beliefs

24
New cards

cyberterrorists

___________ attack a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.

25
New cards

authority

Directed by someone impersonating authority figure or falsely citing their authority

26
New cards

intimidation

To frighten and coerce by threat

27
New cards

consensus

Influences by what others do

28
New cards

scarcity

Something is in short supply

29
New cards

urgency

Immediate action is needed

30
New cards

familiarity

Victim well-known and well-received

31
New cards

trust

Help a person known to you

32
New cards

ethics

The standards that determine whether an action is good or bad is known as _______

33
New cards

technology ethics

_________are the moral guideline that govern the use of computers, mobile devices, information systems, and related technologies

34
New cards

information accuracy

intellectual property rights

green computing

Frequently discussed areas of computer ethics include ____________

35
New cards

information accuracy

___________ is a concern today because many users access information maintained by other people or companies. such as on the internet

36
New cards

graphics equipment and software

With ______________, users can easily digitize photos and then add. change. or remove images

37
New cards

intellectual property rights

______________ are the rights to which creators are entitled to their work

38
New cards

creative commons

_________ is another source for finding content that may or may not be used, along with any restriction or payment needed to use it

39
New cards

piracy

A common infringement of copyright is ________, where people illegally copy software, movies, and music

40
New cards

digital rights management

These issues with copyright law led to the development of the _____________ strategy

41
New cards

green computing

___________ involved reducing electricity and environmental waste while using computers, mobile devices, and related technologies

42
New cards

electrical waste

Organizations can implement a variety of measures to reduce _______

43
New cards

true

T or F: Information transmitted over networks has higher degree of a security risk than information kept on an organization’s premises

44
New cards

networks

Information transmitted over __________ has higher degree of a security risk than information kept on an organization’s premises

45
New cards

malware

________ is short for malicious software which consists of programs that act without user’s knowledge and deliberately alter the operations of computers and mobile devices

46
New cards

payload or destructive event or prank

Malware can deliver its ___________ or __________ or __________, on a computer or mobile device in a variety of ways

47
New cards

email attachments

A common way that computers and mobile devices become infected with viruses and other malware is through users opening infected ___________

48
New cards

adware

A program that displays an online advertisement in a banner, pop-up window, or pop-under window on web pages, email messages, or other internet services

49
New cards

ransomware

A program that blocks or limits access to a computer, phone or file until the user pays a specified amount of money

50
New cards

rootkit

A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

51
New cards

spyware

A program places on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicate the information it collects to some outside source while the user is online

52
New cards

trojan horse

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a _______ does not replicate itself to other computers or devices

53
New cards

virus

A potentially damaging program that affects or infects a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission

54
New cards

worm

A program that copies itself repeatedly, for example, in memory or on a network, using up resources and possibly shutting down the computer, device, or network

55
New cards

zombie

A compromised computer or device known as a _______, is one whose owner is unaware that the computer or device is being controlled remotely by an outsider

56
New cards

botnet

__________ or zombie army, is a group of compromised computers or mobile devices connected to a network that are used to attack other netowrks, usually for nefarious purposes

57
New cards

zombie army

botnet is also known as

58
New cards

bot

______ is a program that performs a repetitive task on a network

59
New cards

botnets

Cybercriminals install malicious bots on unprotected computers and devices to create _______

60
New cards

DoS attack

__________ is a type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services such as the web or email

61
New cards

Denial of Service

DoS stands for ___________

62
New cards

distributed Dos

A more devasting type of DoS attack is ________________, in which multiple computers such as a zombie army, are used to attack a server or other network resource.

63
New cards

extensive

The dame caused by a DoS or DDoS attack usually is ________

64
New cards

back door

A program or set of instructions in a program that allows user to bypass security controls when accessing a program, computer, or network

65
New cards

bypass

A program or set of instructions in a program that allows user to _______ security controls when accessing a program, computer, or network

66
New cards

true

T or F: A rootkit can be a backdoor

67
New cards

worms

Some ________ leave backdoors which have been used to spread other worms or to distribute spam from the unsuspecting victim’s computers

68
New cards

true

T or F: Programmers often build back doors intro programs during system development to save development time

69
New cards

spoofing

_________ is a technique intruders use to make their network or internet transmission appear legitimate to a victim’s computer or network

70
New cards

IP and address spoofing

Two common types of spoofing schemes

71
New cards

IP spoofing

_________ occurs when an intruder computer tricks a network into believing its IP adress is associated with a trusted source

72
New cards

address spoofing

__________ occurs when the sender’s email address or other components of an email header are altered

73
New cards

digital footprint

________ is the record of everything you do online

74
New cards

false

T or F: A digital footprint can be nearly impossible to completely erase.

75
New cards

firewalls

_________ and access controls protect data and information on computers and other devices.

76
New cards

financial gain

For most computer users, the greatest risk comes from attackers who want to steal their information for their own ______==

77
New cards

virtual private network

Mobile users today often access their company networks through a ________

78
New cards

VPN

A private, secure path across a public network that allows authorized users to secure access to a company or other network

79
New cards

VPN

A _____ provides the mobile user with a secure connection to the company’s network server as if the user has a private line

80
New cards

VPN

________ help ensure that data is safe from being intercepted by unauthorized people by encrypting data it transmits from a laptop, smartphone, or other mobile devices

81
New cards

firewalls

___________ protect network resources from outsiders and to restrict employee’s access to sensitive data, such as payroll or personnel records

82
New cards

proxy server

It is a server outside the organization’s network that controls which communications pass in and out of the organization’s network

83
New cards

true

T or F: Both Windows and Mac operating systems include firewall capabilities

84
New cards

unauthorized access

__________ is the use of a computer or network without permission

85
New cards

acceptable use policy or AUP

An organization’s ____________ should specify the acceptable use of technology by employees for personal reaons

86
New cards

AUP

An organization should document and explain AUP to employees

87
New cards

access controls

Many organizations use _________ to minimize the change that a perpetrator, intentionally or an employee accidentally may access confidential information on a computer

88
New cards

audit trail

The computer device or network should maintain an _________ that records access attempts

89
New cards

backup

To protect against data loss caused by hardware, software, or information theft or system failure, ________ is required

90
New cards

online backup

____________ services use special software on the computer to monitor what files have change or have been created

91
New cards

cloud backup

_________ services can save you the cost of maintaining hardware

92
New cards

full backup

Copies all of the files on media in the computer

93
New cards

differential backup

Copies only the files that have changed since the last full backup

94
New cards

incremental backup

Copies only the files that have changed since the last or full incremental backup

95
New cards

selective backup

Users choose which folders and files to include in a backup

96
New cards

continuous data protection

All data is backed up whenever a change is made

97
New cards

remote management

________ allows the configuration settings to be changed from anywhere through an internet connection

98
New cards

access password

This requires a password to access the configuration settings of the device

99
New cards

SSID

______ is the name of the local wireless network

100
New cards

WPA2

_______encrypts the wireless data transmission and also limits who can access the Wi-Fi network