WGU - Introduction to IT - D322 Section 8 Review 5.0 (1 review) Students also studied Terms in this set (66) Western Governors UniversityD 322 Save
WGU D322
Teacher 489 terms iamvictor_udeh Preview D322 - Introduction to IT - Final Exa...129 terms Chris_Brantley9 Preview Intro to IT - WGU Section 2 Starter S...55 terms anna_striedel1 Preview WGU - 69 terms Atra Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?Computer Matching and Primary Protection Act of 1988 Security Breach Notification laws The Electronic Communication Privacy Act of 1986 Digital Signature and Electronic Authorization laws Security Breach Notification laws What is part of the role of an IT professional association?Engages in best practices for information systems Provides professional standards for ethical behavior Writes laws dealing with information technology Engages in best practices for information systems Provides professional standards for ethical behavior What is not part of the role of an IT professional association?Engages in best practices for information systems Provides professional standards for ethical behavior Writes laws dealing with information technology Writes laws dealing with information technology How can an organization assist employees with the ethical use of information technology?By developing policies for information usage By monitoring network throughput By ensuring databases are backed up By establishing optimal server performance By developing policies for information usage
Computer SecurityFocuses on protecting data from unauthorized use and the exploitation of stolen data for profit.Computer EthicsMoral guidelines that govern the use of computers and information systems.Computer PrivacyFocuses on the use and governance of personal data, ensuring that it is collected, shared, and used appropriately.What does the acronym CIA stand for in cybersecurity?Central Intelligence Agency Confidentiality, integrity, and availability Confidentiality, intelligence, accessibility Cybersecurity, internet, accessibility Confidentiality, integrity, and availability Confidentiality [CIA triad]the rules that restrict access to only those who need to know.Integrity [CIA triad]Addresses the level of assurance that can be given as to how accurate and trustworthy data is.Availability [CIA triad]Data being available to the people who need it when they need it.Ways to enforce confidentiality- Implementing access controls
- Training clients to identify and reduce security risks by doing the following:
- user access controls
- version control
- redundant systems or copies.
- testing compatibility with operating systems and installed applications
- keeping systems patched and up-to-date.
Create strong password policies and Recognize social engineering attacks.Social Engineeringa general term that describes any attack that takes advantage of humans' trusting nature.Ways to maintain Integrity- file permissions
Ways to ensure availability- rigorously maintaining all hardware
Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10.Which part of the CIA triad has been broken in this scenario?Confidentiality Availability Integrity None of the above Integrity
Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records.Which part of the CIA triad has been compromised in this scenario?Availability Confidentiality Integrity None of the above Availability Mei gets the company's phone service invoice in the mail.The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80.Which part of the CIA triad has been compromised in this scenario?Confidentiality Integrity Availability None of the above Integrity conflict of interesta situation in which a person has two relationships that might be incompatible with each other.Organizations should provide clear outlines on how to handle conflicts of interest.true information privacythe right to control how your personal information is collected, used, and exchanged.1st commandment of computer ethicsThou shalt not use a computer to harm other people.2nd commandment of computer ethicsThou shalt not interfere with other people's computer work.3rd commandment of computer ethicsThou shalt not snoop around in other people's computer files.4th commandment of computer ethicsThou shalt not use a computer to steal.5th commandment of computer ethicsThou shalt not use a computer to bear false witness.6th commandment of computer ethicsThou shalt not copy or use proprietary software for which you have not paid.7th commandment of computer ethicsThou shalt not use other people's computer resources without authorization or proper compensation.8th commandment of computer ethicsThou shalt not appropriate other people's intellectual output.
9th commandment of computer ethicsThou shalt think about the social consequences of the program you are writing or the system you are designing.10th commandment of computer ethicsThou shalt always use a computer in ways that ensure consideration and respect for other humans.Asimov's Three Laws of Robotics1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.
- A robot must obey orders given it by human beings except where such orders
- A robot must protect its own existence as long as such protection does not
would conflict with the First Law.
conflict with the First or Second Law.EPSRCEngineering and Physical Sciences Research Council - creates knowledge in engineering and physical sciences for UK capability to benefit society and the economy.AHRCArts and Humanities Research Council - funds outstanding original research across the whole range of the arts and humanities.Engineering and Physical Sciences Research Council (EPSRC) and the Arts and Humanities Research Council (AHRC) of Great Britain's set of five ethical "principles for
designers, builders and users or robots:"
- Robots should not be designed solely or primarily to kill or harm humans.
- Humans, not robots, are responsible agents. Robots are tools designed to
- Robots should be designed in ways that assure their safety and security.
- Robots are artifacts; they should not be designed to exploit vulnerable users by
- It should always be possible to find out who is legally responsible for a robot.
achieve human goals.
evoking an emotional response or dependency. It should always be possible to tell a robot from a human.
IEEEInstitute of Electrical and Electronics Engineers. A professional organization that develops communications and network standards, among other activities.ACMAssociation for Computing Machinery Membership organization for computing professionals Provides resources Professional development Promotes policies and research for the benefit of society AUPAcceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.AITPAssociation of Information Technology Professionals - a professional association that focuses on information technology education for business professionals.Network TypesPersonal area network (PAN) local area network (LAN) wireless LAN (WLAN) metropolitan area network (MAN) virtual private network (VPN) wide area network (WAN) virtual LAN (VLAN) home network