Correctly answered to pass
1. acceptable
use policy A document that stipulates restrictions and practices that a user must
(AUP) agree in order to use organizational computing and network
resources.
2. advanced
persis- tent
threat (APT) A network attack in which an intruder gains access to a network and
stays there—undetected— with the intention of stealing data over a
long period of time (weeks or even months).
3. Agreement on
Trade-Related
Aspects of An agreement of the World Trade Organization that requires member
Intellectual govern- ments to ensure that intellectual property rights can be enforced
Property under their laws and that penalties for infringement are tough enough to
Rights (TRIPS)
deter further violations.
4. anonymous
ex- pression
5. anonymous
re- mailer
service The expression of opinions by people who do not reveal their identity.
A service that allows anonymity on the internet by using a computer
program that strips the originating header and/or IP address from the
message and then forwards the message to its intended recipient.
6. anti-SLAPP laws Laws designed to reduce frivolous SLAPPs (strategic lawsuit against pub
par-
ticipation [SLAPP], which is a lawsuit filed by corporations, government
oflcials, and others against citizens and community groups who oppose
them on matters of concern).
7. antivirus soft- 8. artificial intelli- gence systems
ware
,WGU C961 Ethics In Technology Glossary Terms
Correctly answered to pass
Software that scans
for a specific sequence
of bytes, known as a
virus signature, that
indicates the
presence of a
specific virus.
The people,
procedures, hardware,
software, data, and
knowledge needed to
develop computer
systems and machines
that can simulate
human intelligence
processes, including
learning (the
acquisition of
information and rules
for using the
information), reasoning
(using rules to reach
conclusions), and self-
correction
,WGU C961 Ethics In Technology Glossary Terms
Correctly answered to pass
(using the outcome from one scenario to improve its performance on
future scenarios).
9. audit committee A group that provides assistance to the board of directors in fulfilling its
re-
sponsibilities with respect to the oversight of the quality and integrity
of the organization's accounting and reporting practices and controls,
including financial statements and reports; the organization's
compliance with legal and regulatory requirements; the qualifications,
independence, and performance of the compa- ny's independent auditor;
and the performance of the company's internal audit team.
10. Bathsheba The moral corruption of people in power, which is often facilitated by a
syn- drome
tendency for people to look the other way when their leaders act
inappropriately.
11. blended threat A sophisticated threat that combines the features of a virus, worm, Trojan
horse, and other malicious code into a single payload.
12. body of An agreed-upon sets of skills and abilities that all licensed professionals
knowl- edge
must possess.
13. botnet A large group of computers, which are controlled from one or more remot
locations by hackers, without the knowledge or consent of their owners.
14. breach of The failure of one party to meet the terms of a contract.
con- tract
15. breach of
the duty of The failure to act as a reasonable person would act.
care
16. bribery The act of providing money, property, or favors to someone in business or
government in order to obtain a business advantage.
,WGU C961 Ethics In Technology Glossary Terms
Correctly answered to pass
17. bring your A business policy that permits, and in some cases, encourages
own device
(BYOD) employees to use their own mobile devices (smartphones, tablets, or
laptops) to access company