Information Ethics
Developing Information Policies
Protecting Intellectual Assets
First Line of Defense
Second Line of Defense
100
This is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
What is Privacy
100
This includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on a website.
What is Cyberbulling
100
This refers to a period of time when a system is unavailable.
What is Downtime
100
They detail how an organization will implement the information security policies.
What is Information Security Plan
100
These are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
What is Destructive agents
200
This examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
What is Information Management
200
This contains general principles to guide computer user behavior.
What is an Ethical Computer Use Policy.
200
This is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
What is Information Security
200
These people are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
What is Insiders
200
This reroutes requests for legitimate websites to false websites.
What is Pharming
300
This is the unauthorized use, duplication, distribution, or sale of copyrighted software.
What is Pirated software
300
This is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
What is Internet censorship
300
This is a special class of adware that collects data about a user and transmits it over the Internet without the user's knowledge or permission. It usually comes in free downloadable software.
What is Spyware
300
Through doing this, hackers use their social skills to trick people into revealing access credentials or other valuable information.
What is Social Engineering
300
These are small electronic devices that change user passwords automatically.
What is Tokens
400
This refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
What is Ediscovery (electronic discovery)
400
This sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
What is a Mail Bomb
400
These people seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
What is Cyberterrorists
400
These are rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
What is Information Security Policies
400
This is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
What is Cryptography
500
The is the law that was passed to protect minors from accessing inappropriate material on the Internet.
What is the Child Online Protection Act
500
This is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
What is Teergrubing
500
They find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
What is Script Kiddies or script bunnies.
500
This is a way hackers obtain information by looking through people's trash.
What is Dumpster Diving
500
These are computer viruses that wait for a specific date before executing their instructions.
What is Time Bombs
M
e
n
u