1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Ethics
Principles for judging right and wrong actions.
Cyber Citizenry
Demonstrating responsible behavior online.
Ethical Decision Making
Process of evaluating choices before acting.
Plagiarism
Using someone else's work as your own.
Citing
Giving credit to original sources of information.
Whistleblowing
Reporting unethical or illegal workplace conduct.
Chain of Command
Hierarchy for addressing workplace issues.
Evidence Collection
Gathering proof to support accusations legally.
Confidentiality Agreements
Contracts to protect sensitive information.
Copyright
Protection for original works of authorship.
Hacker
Individual breaking into systems legally for security.
Cracker
Individual breaking into systems illegally for gain.
Backdoors
Shortcuts left in software for maintenance access.
Phishing
Fraudulent attempts to obtain sensitive information.
Dumpster Diving
Searching trash for confidential information.
Access Attacks
Unauthorized attempts to obtain information.
Modification Attacks
Illegally altering information in transit or storage.
Denial-of-Service Attack
Prevents legitimate users from accessing resources.
Repudiation Attacks
Removing evidence of an event's occurrence.
Acceptable Use Policy
Guidelines for proper computer and network usage.
Virtual Private Network (VPN)
Secure connection within a larger network.
Disaster Recovery Plan
Strategy to restore operations after a disaster.
Biometrics
Identification using biological traits like fingerprints.
Computer Forensics
Investigating crimes through digital evidence analysis.
Job Growth Outlook
Positive employment growth projected through 2030.
Student Handbook
Resource for policies and ethical guidelines.
Support Network
Group providing assistance during ethical dilemmas.