MIS 180 Lecture Notes - Lecture 3: Informed Consent, Organized Crime, Password
Document Summary
Information ethics - branch of ethics focused on the creation, organization, dissemination, and use of information. Ethical computer use policy - general guidelines for computer user behavior. Social media policies - govern employees public online communication. Workplace monitoring policies - how employer can monitor. Information privacy policy - who can see what. Email privacy - who may read, forward email, what email may be sent. Information secuirty - protection of information from misuse. Hackers - experts who can break into computers and networks. Password hiding - if you write it down it can be found. Phishing - legitimate looking message, follow a link, malware ensues. Information security plans - states policies governing information standards and practices. Virus software - attaches itself to an existing program or file. Trojan horse - apparently legitimate software that grants hacker access to a machine. Content filtering - prevent e-mail with sensitive information from transmitting. Encryption - data only readable by someone with.