Chapter 1,2,; 3 Ethics and Tech – Flashcards

Unlock all answers in this set

Unlock answers
question
moral code
answer
a set of rules that establishes the boundaries of generally accepted behavior within a society
question
morality
answer
social conventions about right and wrong that are widely shared throughout a society
question
morals
answer
one's personal beliefs about right and wrong
question
corporate ethics officer aka corporate compliance officer
answer
a senior-level manager who provides an organization with vision and leadership in the area of business conduct
question
code of ethics
answer
a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decisions making
question
common good approach
answer
an approach to ethical decision making based on a vision of society as a community whose members work together to achieve a common set of values and goals
question
ethics
answer
a set of beliefs about right and wrong behavior within a society
question
fairness approach
answer
an approach to ethical decision making that focuses on how fairly actions and policies distribute benefits and burdens among people affected by the decision
question
integrity
answer
adherence to a personal code of principles
question
law
answer
a system of rules that tells us what we can and cannot do; enforced by a set of institutions
question
software piracy
answer
the act of illegally making copies of software or enabling others to access software or enabling others to access software to which they are not entitled
question
stakeholder
answer
someone who stands to gain or lose depending on how a situation is resolved
question
social audit
answer
a process whereby an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year
question
Sarbanes-Oxley Act
answer
a bill whose goal was to renew investors' trust in corporate executives and their firms' financial reports; the act led to significant reforms in the content and preparation of disclosure documents by public companies
question
problem statement
answer
a clear, concise description of the issue that needs to be addressed in a decision-making process
question
utilitarian approach
answer
an approach to ethical decision making that states that you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected
question
vice
answer
a moral habit that inclines people to do what is generally unacceptable to society
question
virtue
answer
a moral habit that inclines people to do what is generally acceptable to society
question
virtue ethics approach
answer
an approach to ethical decision making that focuses on how you should behave and think about relationships if you are concerned with your daily life in a community
question
audit committee
answer
a subgroup of the board of directors that provides assistance to the board in fulfilling its responsibilities with respect to the oversight of the quality and integrity of the organization's accounting and reporting practices and controls including: financial statements and reports; the organization's compliance with legal and regulatory requirements; the qualifications, the independence, and performance of the company's independent auditor; and the performance of the Company's internal audit function
question
body of knowledge
answer
an agreed-upon set of skills and abilities that all licensed professionals in a particular type of profession must possess
question
breach of contract
answer
the failure of one party to meet the terms of a contract
question
breach of duty of care
answer
the failure to act as a reasonable person would act
question
bribery
answer
the act of providing money, property, or favors to someone in business or government to obtain a business advantage
question
Business software Alliance (BSA)
answer
trade group that represents the world's largest software and hardware manufacturers; its mission is to stop the unauthorized copying of software produced by its members
question
certification
answer
a recognition that a professional possesses a particular set of skills, knowledge, or abilities- in the opinion of certifying organization
question
commoditization
answer
the transformation of goods or services into commodities that offer nothing to differentiate themselves from those offered by competitors. Commoditized goods and services are sold strictly on the basis of price
question
compliance
answer
to be in accordance with established policies, guidelines, specifications, or legislation
question
conflict of interest
answer
a conflict between a person's (or firm's) self-interest and the interests of a client
question
duty of care
answer
the obligation to protect people against any unreasonable harm or risk
question
firewall
answer
a hardware or software device that serves as a barrier between an organization's network and the internet; a firewall also limits access to the company's network based on the organization's Internet usage policy
question
Foreign Corrupt Practices Act (FCPA)
answer
a federal law that makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office
question
fraud
answer
the crime of obtaining goods, services, or property through deception or trickery
question
globalization
answer
the process of interaction and integration among the people, companies, and governments of different nations
question
government license
answer
a government-issued permission to engage in an activity or to operate a business; it is generally administered at the state level and often requires that the recipient pass a test of some kind
question
IT user
answer
a person for whom a hardware or software product is designed
question
material breach of contract
answer
the failure of one party to perform certain express or implied obligations, which impairs or destroys the essence of the contract
question
misrepresentation
answer
the misstatement or incomplete statement of a material fact
question
modularization
answer
the act of breaking down a production or business process into smaller components
question
negligence
answer
the failure to do what a reasonable person would do, or doing something that a reasonable person would not do
question
profession
answer
a calling that requires specialized knowledge and often long and intensive academic preparation
question
professional code of ethics
answer
a statement of the principles and core values that are essential to the work of a particular occupational group
question
professional malpractice
answer
breach of the duty of care by a professional
question
reasonable person standard
answer
a legal standard that defines how an objective, careful, and conscientious person would have acted in the same circumstances
question
reasonable professional standard
answer
a legal standard that defendants who have particular expertise or competence are measured against
question
resume inflation
answer
falsely claiming competence in a skill, usually because that skill is in high demand
question
trade secret
answer
information, generally unknown to the public, that a company has taken strong measures to keep confidential. it represents something of economic value that has required effort or cost to develop and that some degree of uniqueness or novelty
question
transparency
answer
any attempt to reveal and clarify any information or processes that were previously hidden or unclear
question
whistle- blowing
answer
an effort to attract public attention to negligent, illegal, unethical, abusive, or dangerous act by a company or some other organization
question
reasonable assurance
answer
a concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the systems's benefits or the risks involved
question
risk assessment
answer
the process of assessing security-related risks from both internal and external threats to an organization's computers and networks
question
rootkit
answer
a set of programs that enables its user to gain administrator level access to a computer without the end user's consent or knowledge
question
script kiddie
answer
a technically inept hacker. (see lamer definition)
question
security audit
answer
a process that evaluates whether an organization has a well-considered security policy in place and if it is being followed
question
security policy
answer
a written statement that defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements
question
smart cards
answer
a form of debit or credit card that contains a memory chip that is updated with encrypted data every time the card is used
question
smishing
answer
a variation of phishing in which victims receive a legit-looking SMS text message on their phone telling them to call a specific phone number or to log on a Web site
question
spear-phishing
answer
a variation of phishing in which the phisher sends fraudulent emails to a certain organization's employees. the phony emails are designed to look like they came from high-level executives within the organization
question
trojan horse
answer
a program in which malicious code is hidden inside a seemingly harmless program
question
trustworthy computing
answer
a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices
question
virtual private network (VPN)
answer
a technology that uses the Internet to relay communications, maintaining privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end
question
virtualization software
answer
a software program that emulates computer hardware by enabling multiple operating systems to run on one computer host
question
virus
answer
a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner
question
virus signature
answer
a specific sequence of bytes that indicates to a antivirus software that a specific virus is present
question
vishing
answer
a variation of phishing in which victims receive a voicemail telling them to call a specific phone number or log on to access a specific Web site
question
worm
answer
a harmful program that resides in the active memory of a computer and duplicates itself
question
zero-day attack
answer
an attack that takes place before the security community or software developer knows about the vulnerability or has been able to repair it
question
zombie
answer
a computer that is part of a botnet and that is controlled by a hacker without the knowledge or consent of its owner
question
antivirus software
answer
software that regularly scans a computer's memory and disk drives for viruses
question
botnet
answer
a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owner
question
CAPTCHA (Completely Automated Public Turning Test to Tell Computers and Humans Apart)
answer
software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot
question
cloud computing
answer
an environment in which software and data storage are services provided via the Internet (the cloud); the services are run on another organization's computer hardware and are accessed by a Web browser
question
collusion
answer
cooperation between two or more people, often an employee and a company outsider, to commit fraud
question
competitive intelligence
answer
legally obtained information gathered using sources available to the public; used to help a company gain an advantage over its rivals
question
computer forensics
answer
a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so it is admissible as evidence in a court of law
question
cybercriminal
answer
an individual, motivated by the potential for monetary gain, who hacks into computers to steal, often by transferring money from one account to another
question
cyberterrorist
answer
an individual who launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce a govt in order to advance certain political or social objectives
question
data breech
answer
the unintended release of sensitive data or the access of sensitive data by unauthorized individuals
question
distributed denial-of-service attack (DDoS)
answer
an attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks
question
email spam
answer
the abuse of email systems to send unsolicited email to large numbers of people
question
exploit
answer
an attack on an information system that takes advantage of a particular system vulnerability
question
hacker
answer
someone who tests the limitations of information systems out of intellectual curiosity- to see if he or she can gain access
question
hacktivism
answer
hacking to achieve political or social goal
question
industrial spy
answer
someone who uses illegal means to obtain trade secrets from competitors
question
intrusion prevention system (IPS)
answer
a network security device that prevents an attack by blocking viruses, malformed packets, and other threats from getting into the protected network
question
intrusion detection system (IDS)
answer
software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization
question
lamer
answer
a technically inept hacker (see definition for script kiddie)
question
logic bomb
answer
a type of Trojan horse that executes when it is triggered by a specific event
question
negligent insider
answer
a poorly trained and inadequately managed employee who means well but has the potential to cause much damage
question
phishing
answer
the act of fraudulently using email to try to get the recipient to reveal personal data
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New