Principles of right and wrong that individuals use to make choices that guide their behaviour
2
New cards
Utilitarian approach
An ethical action is the one that provides the most good or does the least harm
3
New cards
Rights approach
Maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties
4
New cards
Fairness approach
Ethical actions treat all human beings equally, or if unequally, then fairly, based on some defensible standard
5
New cards
Common good approach
Highlights the interlocking relationships that underlie all societies
6
New cards
Deontology approach
Morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the action’s consequences
7
New cards
Code of ethics
Collection of principles intended to guide decision making by members of the organization
8
New cards
Fundamentals of ethics
Responsibility, accountability, liability
9
New cards
Responsibility
Accept consequences of your decisions and actions
10
New cards
Accountability
Determining who is responsible for actions that were taken
11
New cards
Liability
Legal concept that gives individuals the right to recover damages done to them
12
New cards
Privacy issues
Collecting, storing, and disseminating information about individuals
13
New cards
Accuracy issues
Authenticity, fidelity, and correctness of information that is collected and processed
14
New cards
Property issues
Ownership and value of information
15
New cards
Accessibility issues
Revolve around who should have access to information and whether they should pay a fee for this access
16
New cards
Information privacy
Right to determine when, and to what extent, information about you can be gathered or communicated to others
17
New cards
Digital dossier
Electronic profile of someone and their habits
18
New cards
Profiling
Process of forming a digital dossier
19
New cards
Data aggregators
Collect public data and integrate it to form digital dossiers on adults, selling them to law enforcement agencies and companies
20
New cards
Customer intimacy
Companies want to know their customers better
21
New cards
Electronic surveillance
Rapidly increasing, particularly with the emergence of new technologies
22
New cards
Privacy policies/privacy codes
Org’s guidelines for protecting the privacy of its customers, clients, and employees
23
New cards
Opt-out model
Permits company to collect personal information until the customer specifically requests that the data not be collected
24
New cards
Opt-in model
Prohibits an organization from collecting any personal information unless the customer specifically authorizes it
25
New cards
P3P
Automatically communicates privacy policies between an electronic commerce website and visitors to that site
26
New cards
Personal Information Protecting and Electronic Documents Act
Canada’s privacy legislation - organizations are required to establish a privacy policy and procedures
27
New cards
General Data Protection Regulation
World’s strongest data protection laws
28
New cards
Personal data
Info that can be used to identify a person
29
New cards
Sensitive personal data
Genetic data, racial information, religious and political views, sexual orientation, etc.
30
New cards
Data controllers
Orgs that have relationships with data subjects
31
New cards
Data processors
Orgs that work for data controllers and process natural data on the controllers’ behalf
32
New cards
Security
Degree of protection against criminal activity, danger, damage, or loss
33
New cards
Information security
Processes and policies designed to protect an organization’s information and IS
34
New cards
Threat
Any danger to which a system may be exposed
35
New cards
Exposure
Harm, loss, or damage that can result if a threat compromises that resource
36
New cards
Vulnerability
Possibility that a threat will harm an information resource
37
New cards
Scripts
Information and computer programs that users with limited skills can download and use to attack any information system that is connected to the Internet
38
New cards
Cybercrime
Illegal activities conducted over computer networks - typically nonviolent, but lucrative
39
New cards
Social engineering
Attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information
40
New cards
Tailgating
Technique designed to allow perpetrator to enter restricted areas that are controlled with locks or card entry
41
New cards
Shoulder surfing
Perpetrator watches employee’s computer screen over their shoulder
42
New cards
Espionage/trespass
Unauthorized individual attempts to gain illegal access to organizational information
43
New cards
Competitive intelligence
Legal info-gathering techniques (ex: studying a company’s website and press releases)
44
New cards
Industrial espionage
Crosses legal boundary (ex: theft)
45
New cards
Information extortion
Attacker threatens to steal or actually steals info from a company and demands payment in return
46
New cards
Sabotage/vandalism
Deliberate acts that involve defacing an organization
47
New cards
Identity theft
Deliberate assumption of another person’s identity, usually to gain access to their financial information or to frame them for a crime
48
New cards
Intellectual property
Property created by individuals or corporations that is protected under trade secret, patent, and copyright laws
49
New cards
Trade secret
Intellectual work that is a company secret and is not based on public information
50
New cards
Patent
Official document that grants holder exclusive rights on an invention or a process for 20 years
51
New cards
Copyright
Statutory grant that provides the creators or owners of intellectual property with ownership of the property for the life of the creator + 50 years
52
New cards
Piracy
Copying a software program without making payment to the owner
53
New cards
Malware
Malicious software that infects computers
54
New cards
Virus
Segment of computer code that performs malicious actions by attaching to another computer program
55
New cards
Worm
Segment of computer code that performs malicious actions and will replicate or spread by itself
56
New cards
Phishing attack
Uses deception to acquire sensitive personal information by pretending to seem official
57
New cards
Spear phishing
Perpetrators find out as much info as they can about an individual, usually done through email
58
New cards
Denial-of-service attack
An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes
59
New cards
Distributed denial-of-service attack
Attacker takes over many computers (bots) and uses these bots (form a botnet) to send info requests to a computer, making it crash
60
New cards
Trojan horse
Software programs that hide in another computer programs and reveal their behaviour only when they are activated
61
New cards
Back door
A password only known to the attacker that allows them to access a computer system at will
62
New cards
Logic bomb
Segment of computer code that is embedded within an organization’s computer programs and is designed to activate and perform a destructive action under specific conditions
63
New cards
Ransomware
Digital extortion that blocks access to a computer system or encrypts an org’s data until the org pays a sum of money
64
New cards
The most common method for ransomware attacks is…
Spear phishing
65
New cards
Ransomware-as-a-service
Type of ransomware where original creators publish the software on the Dark Web, allowing other criminals to use it in return for some of the ransom profits
66
New cards
Doxxing
Threatening to release encrypted data to the public
67
New cards
Alien software
Clandestine software that is installed on your computer through deceitful methods
68
New cards
The vast majority of pestware is…
Adware
69
New cards
Adware
Software that causes pop-up advertisements to appear on your screen
70
New cards
Spyware
Software that collects personal info about users without their consent
71
New cards
Keystroke loggers
Record both your individual keystrokes and your Internet web browsing history
72
New cards
Screen scraper/grabber
Software that records a continuous movie of a screen’s contents rather than simply recording keystrokes
73
New cards
Spamware
Pestware that uses your computer as a launchpad for spammers
74
New cards
Spam
Unsolicited email
75
New cards
Cookies
Small amounts of information that websites store on your computer, temporarily or permanently - can be useful and innocuous
76
New cards
SCADA
Large-scale distributed measurement and control system - link physical world and electronic world
77
New cards
Cyberterrrorism/cyberwarfare
Malicious acts in which attackers use a target’s computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda
78
New cards
Risk
Probability that a threat will impact an information resource
79
New cards
Risk management
Identify, control, and minimize the impact of threats
80
New cards
3 processes of risk management
Risk analysis, risk mitigation, and controls evaluation
81
New cards
Risk analysis steps
Assessing the value of each asset being protected, estimating the probability that each asset will be compromised, and comparing the probability costs of the asset’s being compromised with the costs of protecting that asset
82
New cards
Risk mitigation
Organization takes concrete actions against risks - implements controls to prevent threats from occurring, and developing a means of recovery if the threat happens
83
New cards
Risk acceptance
Accept the potential risk, continue operating with no controls, and absorb any damages that occur
84
New cards
Risk limitation
Limit the risk by implementing controls that minimize the impact of the threat
85
New cards
Risk transference
Transfer the risk by using other means to compensate for the loss, such as by purchasing insurance
86
New cards
Controls evaluation
Organization identifies security deficiencies and calculates the costs of implementing adequate control measures to compare against the value of those control measures
87
New cards
Controls/countermeasures/defence mechanisms
Safeguards assets, optimizes use of org’s resources, and prevents errors or fraud
88
New cards
Defence-in-depth
Orgs use layers of control to protect info systems against diverse threats
89
New cards
Most valuable control
User education and training
90
New cards
Control environment
Management attitudes towards controls, and stated policies and procedures
91
New cards
General Controls
Apply to more than one functional area
92
New cards
Application controls
Controls specific to one application
93
New cards
Security controls
Protect all components of an IS - includes data, software, hardware, and networks
94
New cards
Physical controls
Prevent unauthorized individuals from gaining access to a company’s facilities
95
New cards
Access controls
Restrict unauthorized individuals from using information resources - can be physical or logical
96
New cards
Logical controls
Implemented by software
97
New cards
Authentication
Confirms the identity of the person requiring access
98
New cards
Authorization
Determines which actions, rights, or privileges the person has, based on their verified identity
99
New cards
Biometrics
Authentication method that examines a person’s innate physical characteristics - active and passive categories
100
New cards
Passphrase
Series of characters that is longer than a password but still easy to memorize