Cards (51)

  • RESOURCES - materials which have got value and used to satisfy our needs
  • PHYSICAL RESOURCES - Tangible
  • CONCEPTUAL RESOURCES - non-tangible
  • Information as resource- Facts about something or someone that are provided or learned
    • Facts - considered relevant truths which have been validated are identified
  • Data - considered facts
  • processed data are considered as information as they organized in such a way that they have additional value beyond the value of facts
  • Infosec- practices intended to keep data secure from unauthorized access or alterations
  • infosec- done when being stored and transmitted from one machine location to another.
  • infosec- also known as data privacy
  • DATA PROTECTION - Strategies and processes used to secure the privacy, availability, and integrity of your data
  • DATA PRIVACY - A discipline intended to keep data safe against improper access, theft or loss
  • Data privacy- to keep data confidential and secure by exercising sound data management and preventing unauthorized access
  • availability means matching network and computing resources to the volume of data access you expect and implementing a good backup
    • Accuracy - needs to be accurate enough for the use to which it is going to be put
    • Authenticity - the quality state of being genuine or original, rather than a reproduction of fabrication. 
    • Utility the quality or state of having value for some purpose or end. 
    • Possession - the quality or state of having ownership or control of some object of item
  • Fraud - A deliberate act (failure to act) with the intention of being obtaining an unauthorized benefit
  • Fraud- using deception or false suggestion/ suppression of truth other unethical means, which are believed and relied upon by others
  • Hoaxes - Emails typically arriving in chain letter fashion that often describe impossible events, highly damaging malware or urban language
  • Hoaxes - Intent to frighten & mislead recipients and get them to forward it to others
  • IDENTITY THEFT - The theft of personal info in order to commit fraud
  • System hacking - To access target computer and STEAL/ MISUSE their sensitive info
  • DISCLOSURE - Information LEAKAGE
  • DISCLOSURE -When websites unintentionally revealsensitive info to users
  • PRIVACY BREACH - Occurs when someone accesses info WITHOUT permission
  • RA 8293 - Intellectual Property Code of the Philippines
  • RA 10372 - the revised Intellectual Property Code of the Philippines
  • Copyright - Set of exclusive rights granted by a state to creator of an original work for a limited period of time in exchange to public disclosure
  • Copyright - Provides protection for original expression such as literary, artistic, scholarly, books, articles , paintings
  • DERIVATIVE WORKS – illustrations, maps, photographic works, advertisements, computer program, ect.
  • RA 10372 (2013) - Philippines- all copyrighted materials are recorded and stored at National Library or Supreme  Court library
  • Digital Rights - Permission granted to individuals to legitimately to perform actions involving the use of computer
  • Digital Rights - Protection and realization of existing rights in the context of new digital technologies, especially internet
  • DIGITAL RIGHTS MANAGEMENT - To describe the processes which the author/ publisher of a work exerts their rights to control what the purchaser of the worker is entitled to do
  • Serial keys - ALPHANUMERIC CHARACTERS acting as a key to denote that product/ software is original
  • ENCRYPTION - Process of converting data/ info
  • ENCRYPTION - - Primary purpose to protect confidentiality of digital store on computer system or transmitted via internet
  • PATENT - In exchange for the public disclosure of an invention