Deliberate Threats to Information Systems
Terms in this set (16)
done consciously and intentionally
a statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done
the practice of spying or of using spies, typically by governments to obtain political and military information
enter someone's land or property without permission
the practice of obtaining something, especially money, through force or threats
the action of sabotaging something
action involving deliberate destruction of or damage to public or private property
a thing that is accepted as true or as certain to happen, without proof
the action or crime of stealing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.`
irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
the politically motivated use of computers and information technology to cause severe disruption or widespread fear.
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
(in business) the forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.
the practice of attacking and robbing ships at sea.
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
YOU MIGHT ALSO LIKE...
MIS 386 Chapter 4
Chapter 4: Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues
BUS 340 Ch. 4
THIS SET IS OFTEN IN FOLDERS WITH...
MIS final chapter 10 information systems within the organization
Chapter 5: Data and Knowledge Management