Chapter 14
Security, Privacy, and Ethics
Computer Security; Risks and Safeguards
- Computer
security risks
- Computer
crime
- Safeguards
Computer Viruses
- Boot
sector virus
- File
virus
- Trojan
horse virus
- Macro
virus
- Logic
bomb
- Time
bomb
- Worm
Virus Detection & Removal
- Antivirus
program
- Virus
signature
- Polymorphic
virus
- Stealth
virus
- Inoculate
program files
- Quarantine
files
- Rescue/Emergency
disk
Unauthorized Access
- Hackers
and crackers
- User identification
and Authentication/Passwords
- Possessed
objects
- Biometric
devices
- Callback
system
Hardware Theft
- Hardware
theft
- Computer
vandalism
Software Theft
- Software
Piracy
- Software
licenses
- Single-user
license
- Site
license
- Network
site license
Information Theft
- Encryption
- Plaintext
- Ciphertext
- Private
key encryption
- Public
key encryption
System Failure
- Noise
- Undervoltage
- Brownout/blackout
- Overvoltage/power
surge
- Surge
protectors
- Uninterruptible
Power Supply
- Standby/offline
UPS
- Online
UPS
- Backup
procedures
- Full
backup
- Differential
backup
- Incremental
backup
- Disaster
Recovery Plan
- Emergency
plan
- Backup
plan
- Recovery
plan
- Test
plan
- Computer
security plan
Information Privacy
- Unauthorized
collection and use of information
- Electronic
Communications Privacy Act (ECPA)
- Computer
Matching and Privacy Protection Act
- Computer
Fraud and Abuse Acts
- Fair
Credit Reporting Act
- Employee
monitoring
- Privacy
for Consumers and Workers Act
Ethics and the Information Age
- Computer
ethics
- Information
accuracy
- Codes
of conduct
Internet Security & Privacy Issues
- Pagejacking
- Mousetrap
- Internet
encryption
- Secure
Socket Layer (SSL)
- Digital
signatures
- Digital
certificate
- Certificate
authority
- Objectionable
materials on the Internet
- Censorware
- Internet
filtering