• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back

What is communication?

Theimparting, sharing or exchanging of ideas thoughts, messages, or informationbetween people by speech, signals, writing, or behaviour

What does communication influence?

Relationship, Ability to Interact, Self-Expression and Success

What are the 5 levels of communication?

Group, Mass, Intrapersonal, Interpersonal, Public

What is Non-verbal communication?

Oldest form of social interaction used by humans, communicating through body language

What are Non-verbal Elements?

Body language, Physical Characteristics, Touching, Vocal Quality, Use of Space, Apprearance

What is Plagiarism?

Academic and public dishonesty, latin name of "kidnapper"

What are the four categories of ethical issues in business?

Intellectual property rights, Workplace safety, security of company information and customer and employee privacy

What are the 3 Social Responsibility Theories?

Stockholder Theory, Stakeholder Theory and Social Contract Theory

What is Stockholder Theory?

Managers are agents of the stockholders, increase profit without violating the law

What is Stakeholder theory?

Managers have a responsibility to manage an organisation for the benefit of all its stakeholders

What is Social Contract Theory?

Companies have ethical responsibilities to all members of society

What is Denial of Service(DoS) ?

Hammering a websites equipment with too many requests for information, clogging the system, slowing performance or crashing the site

What are Scans?

Widespread probes of the internet to determine types of computers, services and connections looking for weaknesses

What are Sniffer programmes?

Programs that covertly search individual packets of data as they pass through the internet, capturing passwords of the entire contents

What is Spoofing?

Faking an email address of Web page to trick users into passing along passwords or credit card details

What is a Trojan Horse?

A program that unknown to the user contains instructions that exploit a known vulnerability in some software

What are Malicious Applets?

Tiny Java programs that misuse your computer resources, modify files on the hard disk, send fake emails or steal passwords

What is War Dialing?

Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection

What are Logic bombs?

An instruction in a computer program that triggers a malicious act

What are Password Crackers?

Software that can guess passwords (brute force)

What is Buffer Overflow?

Crashing or gaining control of a computer by sending too much data to buffer memory

What is Social Engineering?

Gaining access to computer systems by talking unsuspecting company employees out of valuable information

What is Dumpster Diving?

Sifting through a company's garbage to find information to help break into their computers

What are back doors?

A hidden point of entry to be used in case the original entry point is detected or blocked

What is a virus?

Viruses must be inserted into another programme


Commonly transmitted through:


The Internet and online services


Email and file attachments


Discs from contaminated computers


Shareware

What are worms?

Worms can run unaided


Commonly transmitted through:The Internet and online servicesEmail and file attachments Discs from contaminated computers Shareware

What is Adware?

Adware allows advertisers to display pop-up and banner ads without the consent of the computer users

What is Spyware?

Type of adware, can steal private information ,add advertising links to web pages redirect affiliate payments, change a user's home page and search settings, make modem call premium-rate numbers, leave security holes that let Trojans in, degrade system performance

How does IT create a negative effect on privacy?

Personal information is collected with every web site visit, confidential information can be stolen or misused

What is Opt-in privacy?

Must explicity consent to allow data to be complied, default for consumers and in Europe

What is Opt-Out data?

Must request data is not collected, defualt in the US

What are 4 ways to protect privacy on the internet?

Encrypt email, send newsgroup postings through anonymous remailers, ask your ISP not to sell your name information to mailing list providers and other marketers, dont reveal personal data and interests on online

What are the 4 types of licensing?

Purchase, site license for a number of copies, shareware and public domain

What is Intellectual Property?

Copyrighted material, music, videos, images etc

What is data encryption?

Using special mathematical algorithims or keys to transform digital data into a scrambled code

What is the most common encryption?

Through public and private keys

What is a zombie computer?

A computer that has been secretly infiltrated by a hacker to conduct illegal activities

How do you defend DoS from Zombie Machines?

Scan for vulnerabilities, close unused ports, remind users not to open .exe mail attachments

How do you defend DoS at the ISP?

Monitor and block traffic spikes, filter spoof IP addresses, coordinate security with network providers

How do you defend DoS at the victims website?

Create backup servers and network connections, limit connections to each server,install multiple intrusion-detection systems and multiple routers for incoming traffic to reduce choke points

What are biometrics?

Computer devices that measure physical traits that are unique to each individual

What are types of biometric security?

Voice recognition, Fingerprints, Retina scan, Hand geometry, Signature dynamics, Keystroke dynamics, Keystroke analysis,Face recognition

What is email monitoring?

Use of content-monitoring software to scan for troublesome words to prevent hackers from spreading viruses or breaking into networked computers

What are computer failure controls?



Controls to prevent computer failures, preentive maintenance e.g backups

What are the 3 failure control capabilitys?

Fail-over, Fail-save and Fail-soft

What are natural disasters?

Floods/fire and Human made criminal acts

What is in a disaster recovery plan?

Which employee will participate, what their duties will be , what hardware/software will be used, use of alternative facilities and offsite storage of databases

What is the Privacy Act 1993?

Controls how agencies collect, use, disclose, store and give access to personal information

What is an agency?

Every person or organisation that holds personal information

When was the treaty of Waitangi?

February, 1840

What did Maori and Crown think they were recieving

Crown understood they were getting sovereignty , Maori understood that were giving governance

What are 4 examples of protecting yourself against computer crime?

Use antivirus and firewall software, install all os patches and upgrdes, Use hard to guess passwords, only use secure sites with credit card details

What are the 3 strikes of the copyright bill?

Detection Notice, Warning Notice and Enforcement Notice

What is intellectual property?

Human innovations and creativity

What are the 6 remedies to the The Copyright act 1994 and the Trade Marks Act 2002?

Damages, Injunctions, Orders to account for profits, Deliver good to owners, $15,000 fine, 5 years in prison