WGU D322 - Introduction to IT Section 8: Ethics

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Three Primary Stages of Data

Data at rest, data in transit, and data in use

2
New cards

Data in Use

Where the data was temporarily stored

3
New cards

Data at Rest

Where the server is located

4
New cards

Data in transit

The many locations the data passed through

5
New cards

Ethics

The morals that individuals and organization abide by.

6
New cards

Regulations

Requirements set by governing bodies and can result in penalties, fines, or even criminal charges.

7
New cards

Ethical Considerations

1. Privacy of data

2. Ownership of data

3. Control Access to resources

4. Data accuracy

5. Data Security

8
New cards

HIPAA (Health Insurance Portability and Accountability Act)

U.S policy: Governs access to and control over health data.

9
New cards

Asimov's Three Laws of Robotics

1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.

2. A robot must obey orders given it by human beings except where such orders would conflict with the First Law.

3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.

10
New cards

EPSRC

Engineering and Physical Sciences Research Council

11
New cards

AHRC

Arts and Human Research Council

12
New cards

ACM

Association for Computing Machinery

13
New cards

IEEE

Institution of Electrical and Electronics Engineers.

14
New cards

ASA

American Statistical Association

15
New cards

AITP

Association of Information Technology Professionals

16
New cards

AWC

Association for Women in Computing

17
New cards

AAAI

Association for the Advancement of Artificial Intelligence

18
New cards

ABET

Accreditation Board for Engineering and Technology

19
New cards

Organization Culture

Defined by the expectations, experiences, philosophy, and values that guide employees' behavior.

20
New cards

AUP

Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.

21
New cards

Information Privacy

Refers to the right to control how your personal information is collected, used, and exchanged. Privacy focuses on the use and governance of personal data, ensuring that it is collected, shared, and used appropriately.

22
New cards

Conflict of Interest

It is a situation in which a person has two relationships that might be incompatible with each other.

23
New cards

Confidentiality

A set of rules that limit access to data/information. Implementing access controls is largely responsible for enforcing confidentiality.

1. Create strong password policies

2. Recognize social engineering attacks.

24
New cards

Phishing

A method of capturing victim's valuable information (e.g., username and password, personal identifiable information) by sending emails that mimic real emails from businesses. These emails seemingly request that you reset the password for your account when in reality the attackers capture the victim's input for their own use.

25
New cards

Integrity

Maintained when the data/information is both trustworthy and accurate. Data must not be changed in transit or altered by unauthorized users.

Methods for maintaining integrity include file permissions, user access controls, version control, and redundant systems or copies.

26
New cards

Availability

Refers to ability to provide reliable access to the data/information for authorized user. Best ensured by rigorously maintaining all hardware, testing compatibility with operating systems and installed applications, and keeping systems patched and up-to-date.

27
New cards

CIA Triad

Confidentiality, Integrity, Availability

28
New cards

United States' Security Breach Notification Laws

Govern the action of a company in the case of data records being compromised, lost, or stolen.