12 Ethical and Legal implications Flashcards
(54 cards)
Computer malware definition
Software designed to damage or disable computer systems or steal sensitive information.
Viruses
Malicious code that attaches to other programs and replicates, spreading from computer to computer.
Worms
Similar to viruses but spread independently without attaching to other files.
Trojans
Disguised as legitimate software, allowing attackers remote access and control upon installation.
Spyware
Monitors and collects user activity (browsing history, keystrokes, personal information).
Ransomware
Encrypts files and demands ransom for decryption.
Adware
Displays unwanted advertisements.
How can malware spread
- Email attachments
- Phishing
- Malicious websites and drive-by downloads
- Infected USB drives/external hard drives
- Software downloads from untrustworthy sources
- Social engineering attacks
- Exploit kits and vulnerability exploitation
- Supply chain attacks
- Cloud storage services
- Instant messaging and social media platforms
- IoT Devices
- Malicious mobile apps
- Ai-powered attacks
What are symptoms of malware infections
- Slow computer performance
- Frequent crashes or freezes
- Unusual pop-ups or error messages
- Unauthorised changes to system settings
- Theft of personal or financial information
How do businesses and individuals protect and prevent malware attacts?
Businesses:
- Cybersecurity solutions
- Employee training
- Regular audits and updates
- Cybersecurity Insurance
Individuals:
- Safe browsing habits
- 2FA
- Regular data backups
- Staying informed
Explain about ubiquity and importance of software, including the benefits and concerns
Examples: communication, Education, Healthcare, Finance, Entertainment.
Benefits: Increased productivity, improved information access, enhanced communication, new forms of entertainment.
Concerns: Privacy, bias and discrimination, job displacement, liability for software malfunctions, copyright and intellectual property, cybercrime and security
Define social networks
Digital platforms that enables users to create personal profiles, establish connections with other individuals, share content etc.
what is the significance of social networks in contemporary society
- communication
- information dissemination
- marketing and advertising
- social and political movements
what is the role of developers in creating and maintaining social networks?
- prioritise key aspects
- privacy and data protection
- content moderation
- promoting positive user experiences
- ongoing education and collaboration
what is IP rights vs content creators
- user rights and access to information
- fair use and transformative works
- distinguishing original and copied content
- detecting copyright violations in user-generated content
- evaluating legitimacy of claims
- balancing rights holder and user interests
- collaboration with rights holders
- investing in AI and human review
- educating users
- providing tools for rights holders
how do you identify infringements and manage take-down requests
- volume overload
- complexity of copyright
- subjectivity of fair use
- balancing rights
- legitimacy assessments
- due process
- preventing abuse
how do you moderate content challenges and strategies for social networks
- defining and detecting harmful content
- addressing algorithmic bias
- ensuring transparency and accountability
what are some strategies for responsible content moderation
- hybrid approach with AI and human moderation
- clear and transparent moderation policies
- user empowerment and education
what are some measures to protect vulnerable users
- enhanced privacy settings for children
- age verification mechanisms
- Educational resources and support
- parental controls
Growing Role of AI on Social Media Platforms
how do you Enhance User Experiences
- personalised content recommendations
- improved search functionality
- accessibility features
what are some ethical concerns and mitigation strategies?
- algorithmic bias
- transparency and explainability
- accountability
what is the developers role in cyber security
Developers contribute to cyber safety through several areas:
- secure coding practices
- security testing
- staying up-to-date on security threats
- building secure systems
- promoting security awareness
describe about cyber-safety with an Australian context
Privacy Act 1988 and Australian Privacy Principles (APPs)
Notifiable Data Breaches (NDB) scheme
Online safety act 2021 and eSafety Commissioner
Collaboration with local experts and organisations