isys ch 4

copyright

the legal protection afforded an expression of an idea, such as a song, book, or video game

intellectual property

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

ethics

the principles and standards that guide our behavior toward other people

privacy

the right to be left alone when you want to be, to have control over your personal possessions, and not be observed without your consent

confidentiality

the assurance that messages and information remain available only to those authorized to view them

information ethics

govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

counterfeit software

software that is manufactured to look like the real thing and sold as such

digital rights management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

information management

examines the organizational resource of information and regulates its definitions, uses, value and distribution ensuring it has the types of data/information required to function and grow effectively

information governance

a method or system of government for information management or control

information compliance

the act of conforming, acquiescing, or yielding information

information property

an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

ediscovery (electronic discovery)

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

child online protection act (COPA)

passed to protect minors from accessing inappropriate material on the internet

epolicies

policies and procedures that address information management along with the ethical use of computers and the internet in the business environment

cyberbullying

includes threats, negative remarks, or defamatory comments transmitted via the internet or posted on the website

threat

an act or object that poses a danger to assets

click-fraud

the abuse of pay-per-click, pay-per-call. and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser

competitive click-fraud

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

ethical computer use policy

contains general principles to guide computer user behavior (i.e. state that users should refrain from playing computer games during working hours)

information privacy policy

contains general principles regarding information privacy

acceptable use policy (AUP)

requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet

nonrepudiation

contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions

internet use policy

contains general principles to guide the proper use of the internet

cybervandalism

the electronic defacing of an existing website

typosquatting

a problem that occurs when someone registers purposely misspelled variations of well-known domain names

website name stealing

the theft of a website's name that occurs when someone, posing as a sites's administrator, changes the ownership of the domain name assigned to the website to another website owner

internet censorship

government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens

email privacy policy

details the extent to which email messages may be read by others

mail bomb

sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning

spam

unsolicited email

anti-spam policy

states that email users will not send unsolicited emails (spam)

opt out

choosing to deny permission to incoming emails

teergrubing

an anti spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

social media policy

outlining the corporate guidelines or principles governing employee online communications

physical security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

workplace MIS monitoring

tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

employee monitoring policy

stating explicitly how, when, and where the company monitors its employees

downtime

refers to a period of time when a system in unavailable

information security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

hackers

experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

drive-by-hacking

a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

virus

software written with malicious intent to cause annoyance or damage

adware

software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user

spyware

a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission

insiders

legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

social engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

dumpster diving

looking through people's trash

information security policies

identify the rules required to maintain information security, such as requiring users to log off before leaving lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days

information security plan

details how an organization will implement the information security policies

destructive agents

malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines

identity theft

the forging of someone's identity for the purpose of fraud

information secrecy

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses

phishing expedition

a masquerading attack that combines span with spoofing

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

vishing (voice phishing)

a phone scam that attempts to defraud people by asking them to call a bogus number to "confirm" their account information

pharming

reroutes requests for legitimate websites to false websites

zombie

a program that secretly takes over another computer for the purpose of launching attacks on other computers

zombie farm

a group of computers on which a hacker has planted zombie programs

pharming attack

uses a zombie farm, often by an organized crime association, to launch a massive phishing attack

authentication

a method for confirming users' identities

authorization

the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space

tokens

small electronic devices that change user passwords automatically

smart card

a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

biometrics

the identification of a user based on physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

time bombs

computer viruses that wait for a specific date before executing their instructions

content filtering

occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information

encryption

scrambles information into an alternative form that requires a key or password to decrypt

decrypt

opposite of encrypt, decode information

cryptography

the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them

advanced encryption standard (AES)

designed to keep government information secure

public key encryption (PKE)

uses two keys: a public key that everyone can have and a private key for only the recipient

certificate authority

a trusted third party, such as verisign, that validates user identities by means of digital certificates

digital certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature

firewall

a hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

antivirus software

scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware

cyberwar

an organized attempt by a country's military to disrupt or destroy information and communication systems for another country

cyberterrorism

the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals

intrusion detection software (IDS)

features full-time monitoring tools that search for patterns in network traffic to identify intruders