Policies and Laws chapter2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary terms related to cybersecurity policies, ethics, compliance, and professional conduct in information technology, based on lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Morals

Personal principles upon which an individual bases his or her decisions about what is right and what is wrong, shaped by upbringing, religion, culture, and personal experiences.

2
New cards

Ethics

A code of behavior or set of rules defined by the group to which an individual belongs, usually based on generally acceptable norms and set by organizations, industries, or governing bodies.

3
New cards

Law

A system of rules, enforced by a set of institutions, that tells us what we can and cannot do.

4
New cards

Integrity

Acting in accordance with a personal code of principles and applying the same moral codes in all situations.

5
New cards

Bathsheba Syndrome

describe the moral corruption of those in power, often facilitated by a tendency for people to look the other way when their leaders behave inappropriately.

6
New cards

Corporate Social Responsibility (CSR)

organization taking responsibility for the impact of its actions and decisions on shareholders, consumers, employees, community, environment, and suppliers.

7
New cards

Corporate Ethics Officer

(Senior level manager)

(Corporate compliance officer)

who provides an organization with vision and leadership in business conduct, ensuring compliance and maintaining the ethics culture.

8
New cards

Code of Ethics (Code of Conduct)

highlights an organization’s key ethical issues and identifies the overarching values and principles important to the organization and its decision making.

9
New cards

Social Audit

When organization reviews how well it is meets its ethical and social responsibility goals and communicates inew goals for the upcoming year.

10
New cards

Software & Information Industry Association (SIIA)

A trade group that promotes the common interests of the software and digital content industries and provides services in business development and intellectual property protection.

11
New cards

Business Software Alliance (BSA)

A trade group that investigates piracy cases and insider reports for financial rewards, often contacting companies to verify software licenses.

12
New cards

Trade Secret

Information that a company has taken strong measures to keep confidential.

13
New cards

Whistle-blowing

An effort by an employee to attract attention to an act by a company that threatens the public interest.

14
New cards

Conflict of Interest (IT/Client)

A conflict between the IT worker’s (or the IT firm’s) self-interest and the client’s interests.

15
New cards

Fraud

The crime of obtaining goods, services, or property through deception or trickery.

16
New cards

Misrepresentation

The misstatement or incomplete statement of a material fact.

17
New cards

Breach of Contract

Occurs when one party fails to meet the terms of a contract.

18
New cards

Material Breach of Contract

Occurs when a party fails to perform certain obligations, thus, impairing or destroying the essence of the contract.

19
New cards

Bribery

The act of providing money, property, or favors to obtain a business advantage, typically done in secret with an expectation of future favor.

20
New cards

Foreign Corrupt Practices Act (FCPA)

A law that makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office, applying to any U.S. citizen or company with shares on a U.S. stock exchange.

21
New cards

Résumé Inflation

Lying on a résumé about one’s qualifications or exaggerating experiences.

22
New cards

Professional

One who possesses the skill, good judgment, and work habits expected from a person who has the training and experience to do a job well, adhering to high ethical and moral standards.

23
New cards

Professional Code of Ethics

A principles and core values that are essential to the work of a particular occupational group, benefiting individuals, the profession, and society.

24
New cards

Certification

A recognition that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization, often requiring prerequisite education, experience, and passing an exam.

25
New cards

Government License

Permission to engage in an activity or to operate a business, intended to improve information systems and encourage high professional standards for IT workers.

26
New cards

Body of Knowledge

For a given profession, it outlines an agreed-upon set of skills and abilities that all licensed professionals must possess.

27
New cards

Negligence

Not doing something that a reasonable person would do or doing something that a reasonable person would not do.

28
New cards

Duty of Care

The obligation to protect people against unreasonable harm or risk.

29
New cards

Reasonable Person Standard

A standard used by courts to evaluate how an objective, careful, and conscientious person would have acted in the same circumstances.

30
New cards

Reasonable Professional Standard

A standard used to measure the actions of professionals who have particular expertise or competence.

31
New cards

Breach of the Duty of Care

The failure to act as a reasonable person would act.

32
New cards

Professional Malpractice

The liability of professionals who breach the duty of care, resulting in negligent care and injuries.

33
New cards

Ethical Hacking (White Hat)

Authorized hacking activities conducted to test and improve security, identify vulnerabilities, and report findings responsibly with written permission.

34
New cards

Malicious Hacking (Black Hat)

Unauthorized hacking done for personal gain, revenge, or disruption, without consent or authorization, often involving data theft, malware, extortion, or system damage.

35
New cards

Acceptable Use Policy (AUP)

A policy that establishes guidelines for the appropriate use of company hardware and software.

36
New cards

Firewall

Hardware or software that serves as the first line of defense between an organization’s network and the Internet, also limiting access based on internet-usage policy.

37
New cards

Compliance

The state of being in accordance with established policies, guidelines, specifications, or legislation.

38
New cards

Audit Committee

A committee that assists the board of directors with the oversight of accounting practices, regulatory compliance, independence of auditors, and performance of internal audit.

39
New cards

Internal Audit Department

A department responsible for determining the effectiveness of internal systems and controls, verifying assets safeguards, measuring policy compliance, and evaluating information reliability for management.