• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU C961 - Ethics in Technology

Latest WGU Jan 13, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

C961 - Ethics in Technology 4.9 (56 reviews) Students also studied Terms in this set (70) Western Governors UniversityD 333 Save C961 Ethics In Technology Glossary ...186 terms silv91Preview WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview WGU C182 Introduction to IT 255 terms rwdixon1993Preview WGU - 85 terms Pon Bathsheba syndromeThe moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately.code of ethicsA statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision-making.corporate compliance officer OR corporate ethics officer A senior-level manager who provides an organization with vision and leadership in the area of business conduct.corporate social responsibility (CSR)The concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers.ethicsA code of behavior that is defined by the group to which an individual belongs.integrityAdherence to a personal code of principles.lawA system of rules that govern what we can and cannot do.moralsThe personal principles upon which an individual bases his or her decisions about what is right and what is wrong.problem statementA clear, concise description of the issue that needs to be addressed.social auditA process whereby an organization reviews how well it is meeting its ethical and social responsibility goals and communicates its new goals for the upcoming year.

software piracyA form of copyright infringement that involves making copies of software or enabling others to access software to which they are not entitled.supply chain sustainabilityA component of corporate social responsibility (CSR) that focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs.stakeholderSomeone who stands to gain or lose, depending on how a particular situation is resolved.viceA habit of unacceptable behavior.virtueA habit that inclines people to do what is acceptable.advanced persistent threat (APT)A network attack in which an intruder gains access to a network and stays there - undetected - with the intention of stealing data over a long period of time (weeks or even months).antivirus softwareSoftware that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.blended threatA sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.botnetA large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.bring your own device (BYOD)A business policy that permits - and in some cases, encourages - employees to use their own mobile devices (smartphones, tablets, or laptops) to access company resources and applications, including email, corporate databases, the corporate intranet, and the internet.business continuity planA risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.CIA security triadRefers to confidentiality, integrity, and availability.computer forensicsA discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act A law that specifies that it is legal to spam, provided the messages meet a few basic requirements: spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.cost per thousand impressions (CPM)One of the two common methods of charging for paid media in which ads are billed at a flat rate per 1,000 impressions, which is a measure of the number of times an ad is displayed whether it was actually clicked on or not.cost per click (CPC)One of the two common methods of charging for paid media in which ads are paid for only when someone actually clicks on them.cyberabuseAny form of mistreatment or lack of care, both physical and mental, using an electronic communications device that causes harm and distress to others.cyberespionageThe deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.cyberharassmentA form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals, causing substantial emotional distress.cyberstalkingThreatening behavior or unwanted advances directed at an adult using the internet or other forms of online and electronic communications; the adult version of cyberbullying.cyberterrorismThe intimidation of the government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals.Department of Homeland Security (DHS)A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a "safer, more secure America, which is resilient against terrorism and other potential threats." disaster recovery planA documented process for recovering an organization's business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.distributed denial-of-service (DDoS) attackAn attack in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks.earned mediaMedia exposure an organization gets through press and social media mentions, positive online ratings, reviews, tweets and retweets, reposts (or "shares"), recommendations, and so on.encryptionThe process of scrambling messages or data in such a way that only authorized parties can read it.

encryption keyA value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext), which is unreadable by those without the encryption key needed to decipher it.exploitAn attack on an information system that takes advantage of a particular system vulnerability.firewallHardware or software (or a combination of both) that serves as the first line of defense between an organization's network and the internet; also limits access to the company's network based on the organization's internet-usage policy.intrusion detection system (IDS)Software or hardware (or both) that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.logic bombA type of Trojan horse malware that executes when it is triggered by a specific event or at a predetermined time.managed security service provider (MSSP)A company that monitors, manages, and maintains computer and network security for other organizations.mission-critical processBusiness processes that are more pivotal to continued operations and goal attainment than others.next-generation firewall (NGFW)A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.organic media marketingA form of marketing that employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts.paid media marketingA form of marketing that involves paying a third party to broadcast an organization's display ads or sponsored messages to social media users.phishingThe act of fraudulently using email to persuade the recipient to reveal personal data.ransomwareMalware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.reasonable assuranceA concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.risk assessmentThe process of assessing security-related risks to an organization's computers and networks from both internal and external threats.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The step-by-step guides offered by this document was incredibly useful for my research. A remarkable purchase!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 13, 2026
Description:

C961 - Ethics in Technology 4.9 (56 reviews) Students also studied Terms in this set Western Governors UniversityD 333 Save C961 Ethics In Technology Glossary ... 186 terms silv91 Preview WGU D333 ...

Unlock Now
$ 11.00