Search
Create
Log in
Sign up
Log in
Sign up
IST 110
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (63)
Privacy
Relationship between an individuals data collection use and dissemination of that data the individual and publics expectations of the collection, use and dissemination of the data, the legal policies and political issues related
Aristotle
People must conduct a public life out of necessity
Warren & Brandeis
People have a right to privacy
Judith & Jarvis Tomson
People can't have a right to something that isn't clearly defined
Sandra Petronio
Boundary Turbulence arises when there is no negotiation or there is conflicting expectations on how the private information should be managed
Personally Identifiable Information
Info that can be used to identify, contact or locate a single person (soc. #, student ID, email, combo of all)
Security
Protecting data & databases from destructive forces and from the unwanted actions of authorized users that can violate the privacy rights of individuals. This includes the ability to detect if there was a privacy breach in the data or databases.
Data Security
Protecting data from destructive forces
2 Methods of Data Protection
Physical Access & Electronic Access
Physical Access
Protecting access to the paper copies of data or physical hardware or areas where data is stored (computers, servers, paper files, cabinets, rooms)
Electronic Access
Protecting access to the electronic data and to the software and databases that store and interact with the data (websites, emails, folders, organizational systems)
4 Types of Electronic Data Security Mechanisms
Data Access, Data Masking, Data Erasure, Data Encryption
Data Access
Authentication: Verifies identity of one entity to another (username/password)
Authorization: Controls ability to perform activities for an authenticated user
Data Masking
Ensuring data security is maintained and PII or sensitive info is not exposed (hiding most of credit card number)
Data Erasure
Software based overwriting that destroys all electronic data residing on a hard drive or other data residing on a hard drive or other digital media to ensure that no sensitive data is leaked when an asset is retired or reused
Data Encryption
Encoding messages or data that only authorized parties can read it (cryptography)
Public-Key Encryption
Most common forms of cryptography
Plaintext
Original message in readable form - Hello!
Ciphertext
Encrypted message thats unreadable only by someone with "private key" keeping message secure (7yfhs!)
Public Key
Encrypts original message (plaintext) by turning it into unreadable message (ciphertext) before transmission
Private Key
Decrypts unreadable message (ciphertext) by turning it back to original message (plaintext) afte transmission
Hackers
Users who seek and exploit weaknesses in a comp. system or network, can have a lot of social/political impact
Hacktivism
Hacking for a cause
Anonymous
Collective name of loosely affiliated individuals that participate in hacktivism
What motivates hackers?
Support of freedom of information
Make political statement
Make social statement
Helps others see technology vulnerabilities
Gain money
Gain fame
For fun
Edward Snowden
29 year old at time of breach
Smart/Techy CIA Employee
Uncovered and leaked large amounts of classified NSA data in 2013
Gave info to journalists then destroyed documents
Seeking asylum in Russia
Believes US government is overstepping its boundaries on surveillance and the public deserves to know
Terrorism
Violent acts or threat of violent acts intended to create fear for a religious, political or ideological goal which targets the safety of civilians
Technologies discussed in Marc Goodman TED talk
Communication Devices: pagers, phones, opp. centers
3D Printing: Guns, accessories
Internet of Things: To be hacked in the future, more connections to more devices = more vulnerabilities
Internet of Things & Bio-terrorism: Hacking DNA for targeted terror, hacking viruses to spread to harm patient
Robotics: Drones targeted at US government buildings
6 Categories of IT used in terrorism
Cyber Terrorism
Propoganda
Fundraising
Recruitment
Data Mining
Internal Communications
Cyber Terrorism
Uses internet to attack others, computer viruses
Propoganda
Provides direct dissemination of information where terrorists orally defend their actions
Fundraising
Uses online sources to raise $ for terrorist groups, using deceptive charities for online donations
Recruitment
Uses internet/social media to recruit new members & build terrorist forces (via chatrooms, blogs, forums)
Data Mining
Provides access to real-time information on maps, people & media coverage related to their terrorist act
"Doxing" - researching identifiable info and publishing it publicly
Internal Communications
Uses devices as a platform for communication within organization to distribute logistical info via encoded messages
Counterterrorism
How technology can be used to fight terrorism
4 Ways Technology can be used for Counterterrorism
Public Crowdsourcing (ask public to report crimes)
Data Collection & Visualization (view, analyze, explain terrorism)
Systems Integration (share criminal data locally/globally)
Hacker Recruitment (anticipate or outsmart criminal hackers)
Activism
An effort to promote, impede or direct social political or economical change
3 Categories of IT used in Activism
Awareness & Advocacy (informing people of events and causes allowing people to show support)
Organization & Mobilization (proceed with action for online or offline events and helping to coordinate that event)
Action & Reaction (online activities to promote social or political agendas with an intention to get a reaction)
Slactivism
Liking charities where user exerts little effort to support
Globalization
Process of international integration due to the exchange of world views, products, ideas and other aspects of nationality and culture
Benefits of globalization
Increases exchange of national/cultural resources
Results in higher levels of material wealth
Results in higher levels of political freedom
Consequences of globalization
Favors the rights of the privileged
Leads to influence of more predominant cultures
Results in less developed countries being left behind
Digital Divide
Gap between people and communities that have access to information technologies they can use and understand, and those who don't have access
Domestic Digital Divide %
15% American Adults don't have internet connection at home
Global Digital Divide %
55% of world has no access to internet
Top 10 Consumer Trends
Lifestyle Network Effect
Streaming Natives
Al Ends the Screen Age
Virtual Gets Real
Sensing Homes
Smart Commuters
Emergency Chat
Internables
Everything Gets Hacked
Netizen Journalists
LifeStyle Network Effect
Benefit of online services to an individual increases based on more people who use it (TripAdvisor)
Streaming Natives
Today's teens are streaming natives due to videos and music being their preferred source of social media consumption
Al Ends the Screen Age
Consumers want to interact with "smart things" without having to communicate via screens such as Amazon's Alexa
Virtual Gets Real
Consumers want virtual technology to be integrated into everyday life
Sensing Homes
Homes will have sensors to monitor the health of the home/occupants (pollen, moisture, ideal lighting/temp.)
Smart Commuters
Commuters want uninterrupted internet connectivity so they can be productive and social on their commutes
Emergency Chat
Social networks will become preferred way to contact emergency services (Facebook's safety check during natural disasters/terrorist attacks)
Internables
Internal sensors in our bodies that measure wellbeing may become the new wearable
Everything Gets Hacked
Smartphone users believe hacking and viruses will continue to be an issue for any technical device
Neitzen Journalists
Consumers share more info online than ever before and they believe it will increase their influence on society - 35% of smartphone owners who have a bad experience with a company share that experience online
Brand Management
Managing the values/reputation that the company wants associated with its products & services; becoming more complex with social media
Example: Viral Recordings of neg. behaviors such as dominos employees recording health code violations
Consumers have platform to voice their opinions (1-5 stars, writing reviews)
Customer Engagement
Attracting new customers & retaining current customers; becoming easier to reach consumers with social media
More personalized & creative marketing: Lays Do Us a Flavor Campaign
Direct communication between company and consumer: Dominos tweeting and responding at consumers
Crowdsourcing
Process of solving problems by connecting with large groups of people online in order to gain their knowledge, expertise, time and resources
3 Types of Crowdsourcing
Get the crowd to do work
Get the crowd to fund the work
Get the crowd to solve complex problems
SDLC
System Development Life Cycle
SDLC 6 Phases
Plan, Develop, Test, Deploy, Maintain, Retire
;