Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
Concerns the collection and use of data about individuals
|
Privacy
|
|
Relates to the responsibility of those who collect data to ensure that the data is correct.
|
Accuracy
|
|
Relates to who owns data and rights to software
|
Property
|
|
Relates to the reponsibility of those who have data to control who is able to use that data
|
Access
|
|
4 Primary Computer Ethics
|
Privacy
Accuracy Property Access |
|
The illegal assumption of someone's identity for the purposes of economic gain
|
Identity theft
|
|
The electronic profile of a person is switched to another
|
Mistaken Identity
|
|
Highly detailed and personalized descriptions of individuals
|
Electronic Profiles
|
|
You are entitled to look at your records held by the goverment agencies
|
Freedom of Information Act
|
|
Records everything that is done on computers for businesses
|
Snoopware
|
|
People think that they are safe online
|
Illusion of Anonymity
|
|
Location sof sites visited by your computer system
|
history file
|
|
specialized programs that are deposited on your hard disk from web sites you have visited
|
Cookies
|
|
monitor your activity at a single site
|
Traditional Cookies
|
|
Monitor you activites across all sites you visit
|
Adware Cookies
|
|
Allow users to selecitvely filter or block the most intrusive cookies while allowing selective traditional cookies to operate
|
Cookie Cutter Programs
|
|
Wide range of programs that are designed to secretly recordand report an individuals activities on the internet
|
Spyware
|
|
Illegal action in which the perpetrator uses special knowledge of computer technology.
|
Computer Crim
|
|
People who gain unauthorized access to a computer system for fun and challenge
|
Hackers
|
|
People that gain unauthorized stuff for malicious purposed
|
Crackers
|
|
Programs that migrate though networks and operation systems and most attach themselves to different programs and databases
|
Viruses (1994)
|
|
Are a special type of virus that does not attach itself to programs and databases.
|
Worms
|
|
Programs that alert users when certain kinds of viruses or worms enter their system
|
Virus Checkers
|
|
Programs that come into a computer system disguised as something else
|
Trojan Horse
|
|
Attempts to slow down or stop a computer system or network
|
Denial of Service (DoS)
|
|
Deceptive act or operation designed to trick individuals into spending their time and money for no return
|
Scam
|
|
Unauthorized copying of programs for personal gain is a form of theft
|
Software Privacy
|
|
Device that separates the computer from the power source of the wall outlet
|
Surge Protector
|
|
Devices such as fingerprint and retinal eye scanners
|
Biometric Scanning
|
|
A security buffer between the corporatioons private network and all external networks, inclding the internet
|
Firewalls
|
|
Protecting hardware from possible human and natural disasters
|
Physical Security
|
|
Protecting software and data from unauthroized tampering
|
Data Security
|
|
Special emergency facilities that back up computer centers
|
Hot Sites
|
|
Empty shells in which hardware must be installed
|
Cold Sites
|
|
Code messages sent over a network
|
Encrypting
|
|
Limit access to authorized persons such as passwords.
|
Restrictin
|
|
Prepare for disasters by ensureing security
|
Anticipating
|
|
Routinely copy data and store it at a remote location
|
Backing up
|
|
The study pof human factors related to things people use
|
Ergonomics
|
|
Program to discourage waste in the microcomputer industry
|
Energy Star
|