MIS 180 Lecture Notes - Lecture 3: Informed Consent, Organized Crime, Password

35 views4 pages

Document Summary

Information ethics - branch of ethics focused on the creation, organization, dissemination, and use of information. Ethical computer use policy - general guidelines for computer user behavior. Social media policies - govern employees public online communication. Workplace monitoring policies - how employer can monitor. Information privacy policy - who can see what. Email privacy - who may read, forward email, what email may be sent. Information secuirty - protection of information from misuse. Hackers - experts who can break into computers and networks. Password hiding - if you write it down it can be found. Phishing - legitimate looking message, follow a link, malware ensues. Information security plans - states policies governing information standards and practices. Virus software - attaches itself to an existing program or file. Trojan horse - apparently legitimate software that grants hacker access to a machine. Content filtering - prevent e-mail with sensitive information from transmitting. Encryption - data only readable by someone with.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents