Topic 5: Issues and impact Flashcards

1
Q

How does Manufacturing digital devices affect the environment?

A
  • Large quantities of raw materials are needed. Some non-renewable and some highly toxic
  • Mining for raw materials damages wildlife habitats
  • Energy used in manufacturing process comes from non-renewable fossil fuels, which contributes to global warming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the disposal of digital devices affect the environment?

A
  • Discarded devices end up as e-waste
  • E-waste may be illegally dumped in landfill sites, where toxic substances can get into land and water
  • Many computers components cannot be recycled
  • Millions of tonnes of e-waste are dumped into developing countries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the energy consumption of a digital device

A

Energy is consumed in:
- producing computer equipment
- functioning of equipment
- online data storage in data centres
- recycling of equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsible recycling advantages

A
  • reduce chemical leakage / fires in landfills
  • enable the recovery of valuable metals
  • reduce need for mining
  • enable the recycling of plastic cases
  • reduce amount of harmful toxins released into the air
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How manufacturers contribute to the short replacement cycle

A
  • use embedded batteries, making difficult to replace them
  • gluing components to make repair difficult
  • inflating price of spare parts, to make repair expensive
  • only providing software updates for a limited time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Consequences of short replacement cycle

A
  • It adds to e-waste, as more devices are thrown away
  • More devices must be manufactured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Responsible ownership

A
  • keeping devices for longer
  • buying a pre-owned device
  • donating unwanted devices
  • using energy-efficiency measures
  • reducing internet usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ways to reduce energy consumption

A
  • Adjust energy settings into ‘sleep’ mode
  • Switch off Bluetooth, Wi-Fi and GPS when not using
  • Close dormant applications
  • Disconnect peripherals
  • Choosing devices with high energy-efficiency rate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Positive impact

A
  • Intelligent traffic control systems keep traffic moving reducing fuel consumption
  • ‘Smart lighting’ switches off lights when they are not needed
  • Using imnternet to work from home reduces burning of fossil fuels which reduces greenhouse gases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is digital footprint?

A

the trail of personal data left behind each time someone uses the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of collecting personal data

A
  • Personalisation: offers can be directed to an individuals preferences
  • Convenience: personal details, such as credit card numbers and addresses, only need to be entered once
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Drawbacks of collecting personal data

A
  • Privacy: not obvious who is collecting data and who they are passing it to
  • Security: data breaches occur frequently
  • Discrimination: analysis of shared data could discriminate people
  • Civil liberties: analysis of shared data by police forces could wrongly associate innocent people with criminal behaviour
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethical issues of owning data:

A
  • When posting a foto, IP is retained, but company can do what they want do with the photo
  • Medical records in the UK, belong to National Health Service, and patients only have right to view them.
  • User will always own their names and addresses, but not clear who owns data about their activity
  • Online retailers sell shoppers’ purchase data to other retailers. Google sells people’s search histories.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data protection act 2018 (7 principles)

A
  • Must have a reason for processing person’s data
  • Only use the data for the specific purpose
  • Only collect as much data as is necessary
  • Ensure that the data they collect is accurate and current
  • Not keep data for longer than necessary
  • keep data secure and protect it against loss or damage
  • Demonstrate that their data protection measures are adequate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The DPA gives data subjects (persons whose data is stored) the right to:

A
  • be informed about the collection of their data
  • access their data
  • have inaccurate data corrected
  • have data erased
  • object to how their data is processed
  • withdraw consent at any time
  • restrict the way in which their data is processed
  • obtain and reuse their data for their own purposes
  • complain to the Information Commissioner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer Misuse Act 1990

A

was used to prosecute cyber criminals in the UK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The computer misuse act identifies 3 offences:

A
  • Unauthorised acces to computer material (logging into another person’s computer)
  • Unauthorised acces eith intent to commint further offences (stealing sombody’s credit card and using it for another crime)
  • Unauthorised access with intent to impair the running of a computer or to damage or destroy data (planting a virus)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cookies

A

is a small text file that is downloaded onto a user’s computer when they visit a website. Enables website recognise and store users preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Benefit of accepting cookies

A

Saves time, because enables the website to store customers preference, delivery details, etc. so that the customer only has to supply this information once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Aritficial intelligence

A

computer systems capable of performing tasks that typyically require human intelligence such as: pattern recognition, problem solving and decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Machine learning

A

is a subset of AI, the algorithm learns by looking for rules and patterns in real-time data. They get progressively better, without having specific rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Narrow AI

A

a type of AI that cannot perform multiple tasks, they are able only to perform one specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Examples of narrow AI

A
  • email spam detctors
  • facial and finger print recognition systems
  • voice recognition in digital assistants
  • self driving cars
  • content recomendations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Algorithmic bias

A

is when an algorithm is biased and perjudices or discriminates certain individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Reasons why algorithmic bias occurs

A
  • Dataset used to train the AI system is itself biased
  • there is a design flaw in the AI algorithm causing it to exaggerate bias
  • the developers who design and build AI systems unintentionally incorporate their own prejudices and preconceptions into them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Who is responsible when an AI system goes wrong?

A

Could be:
- the creator of the algorithm
- the supplier of the data
- the user of the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does copyright protect?

A

Novels, textbooks computer programs, images, films, music recordings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How long lasts copyright?

A

lasts for 70 years after the death of the copyright holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Patents

A
  • Protect new inventions, both what they do and how they work.
  • protection is not automatic as copyright
  • applicant has to demonstrate that their invention is different from anything else that exists.
  • a patent holder has 20 years to use and sell the invention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Disadvantage of patents

A

Patents and copyright are meant to foster innovation, but has the opposite effect

31
Q

Trademarks

A

Unique company logos, strap lines, colours and words can be registred as trademark.
® - trademark that has been officially registered
TM - trademark that has not been registered
- Companiesuse these to distinguish their goods from competitors
- Trademarks last for 10 years

32
Q

2 reasons why a company may decide to register and use a trademark to protect its logo

A

So that the company can:
- take legal action against anyone who uses its logo without permission
- put the ® symbol next to its logo to indicate ownership

33
Q

Open source software

A

Software that is distributed with a licence that allows anyone to use, view modify and share its source code.

34
Q

Advantages of open-source software

A
  • Users have acces to code
  • Users can modify and distribute the software
  • Can be installed on any machine
  • Big community of enthusiasts that provide support
  • Most is free to use (there are exceptions)
35
Q

Disadvantages of open-source software

A
  • May not be free of bugs or fully tested
  • May need specialist knowledge to install.
36
Q

Examples of open-source softwares

A
  • LibreOffice
  • Linux
  • Android
  • Firefox
  • Apache
37
Q

Proprietary software

A

Software that is owned by an individual or a company. It is protected by copyright law, making it illegal for users to modify or share it

38
Q

Advantages of proprietary software

A
  • Tested by developers
  • Supported by a dedicated team
  • If there are any vulnerabilities or bugs, a patch will be released speedily
  • Extensive support from third parties (tutorials, magazines, …)
39
Q

Disadvantages of proprietary software

A
  • Users do not have acces to code
  • Users do not have permission to modify the software
  • Usually paid for and licensed on a per-user, per-machine basis
40
Q

Examples of proprietary software

A

Microsoft Windows
iTunes
MacOS
Adobe Photoshop

41
Q

5 conditions specified in the licecne agreement

A
  • Nr of computers tha software can be installed on
  • How many people can use the software at the same time
  • How long the licence is valid
  • Which settings the software can be used in
  • Wheter the user must agree to allow automatic updates
42
Q

Cyberattack

A

a malicious attempt by a hacker to gain unauthorised access to digital system in order to cause damage or steal data

43
Q

Malware

A

general term for malicious software. Some hackers have the ability to write their own malware, others download the code from internet.

44
Q

Reasons why hackers use malware

A

1- to infect a computer with a virus or worm, to cause the computer to run slowly or crash, or just to damage / delete data.
2- To gain backdoor acces into a computer / network and then launch a ranswomware attack
3- To spy on what a user is doing
4- To create a botnet to carry out a DDS attack

45
Q

How works reason nr 1

A
  • A virus inserts into a program and lies hidden. Once activated it makes copies of itself and attaches these to ther programs. Infected programs are passef on via email, messaging and social media.
  • Worms infect systems by moving from one device to another. They can infect an entire network quickly.
46
Q

How works reason nr 2

A
  • Trojans masquerade as legitimate software that users are tricked into downloading. It runs every time the computer is switched on, providing acces to files on hard drive and backdoor to devices in the same network
  • Trojans are used to deliver ransomware, which encrypts the files on the computer. The victim must pay to get the key to decrypt them, otherwise it will be lost.
47
Q

How works reason nr 3

A

A keylogger secretly records the keystrokes a user makes, enabling the hacker to extract valuable information, such as passwords and credit card numbers.

48
Q

How does a DDS attack work (reason nr 4)

A

A DDS attack floods a network or website with huge volumes of traffic causing it to crash. They hack many many computers, just to generate traffic on a website or network, so that the victim pays in order to stop the congestion of the network / website

49
Q

black -hat hackers

A

cybercriminals that break into digital systems in order to cause harm.

50
Q

white-hat hackers

A

help organisations to strengthen their defences against cyberattacks

51
Q

What is a technical vulnerability

A

a hardware, software or configuration fault that makes it easier for a hacker to attack

52
Q

Technical vulnerabilities that hackers exploit

A
  • Unpatched software
  • Out-of-date anti-malware
  • Open ports
  • Default admin passwords
53
Q

Unpatched software

A

When a security fault is discovered, the software producer must work quickly to produce a patch that will fix the issue.
Otherwise, hackers will try to exploit it by launching a zero-day attack

54
Q

Out-of-date anti-malware

A

Malware works by scanning files and comparing with their database of malware signatures.
Anti-malware software only works if its database is up to date with the latest malware signatures. Otherwise recent malware will not be in its library and such malware will be missed.

55
Q

Open ports

A

Services that rely on internet use dedicated computer ports to transmit information. Hackers can do port scanning helping them to identify possible attack targets

56
Q

Default admin passwords

A

Some hardware devices such as routers and modems are shipped with a factory-set password. Hackers can look up default passwords on the web and use password-hacking software to crack weak passwords.

57
Q

Social engineering

A

Some hackers use techniques to make people reveal confidencial information or install harmful software on their computers. Exploits human nature

58
Q

Social engineering technique: Phishing

A

Victims receive an email from a reputable source, asking them to click on the link which seems a genuine website. But actually this website is controlled by the hacker, and asks the victim to enter ID and password or enter credit card details.

59
Q

Social engineering technique: Pretexting (blagging)

A

The hacker pretends to be from a trusted organisation, which says there is an emergency that must be dealt with. By stressing the urgency of the situation, the attacker panics the victim into divulging confidential information

60
Q

Social engineering technique: Baiting

A

Victims are offered a free giveaway, such as a music download or a movie preview. This giveaway comes with harmful malware which infects the victim’s computer. The hacker can also leave an infected USB stick, and when anyone plugs it into a computer, then it will be infected.

61
Q

Social engineering technique: Quid pro quo

A

Victims provide their login details and other security information in exchange for a service, such as a paid software. The attacker offer to help with the instalation, and gives him the opportunity to install malware.

62
Q

Social engineering technique: Shoulder-surfing

A

The hacker looks over a victim’s shoulder, uses binoculars to watch from the distance, or uses a camara to note their login name, password, PIN, etc.

63
Q

Firewall

A

acts as a barrier between the internal network and the internet, monitoring incoming and outcoming traffic.
Also spot suspicious activity within networks, such as users trying to visit harmful websites or who download files from fil-sharing sites.

64
Q

Anti-malware software

A

scans files, and compares it with a library of known malware. If any malware signature patterns are found, it is quarantined until the user decides what to do with it

65
Q

2 types of Heurestic analysis (look up behaviours that suggest malware)

A

Static heurestic analysis- compares source of code with library of known malwares, and if enough of the code matches, the file is identified as malware
Dynamic heurestic analysis - isolates the suspicious file, inside a virtual machine (sandbox) to test what would happen if it was allowed to run.

66
Q

Encryption

A

It does not prevent from being stolen, but protects confidentiality
- Converts data into a scrambled format so that it is not understandable, only the person with a key can decrypt it

67
Q

2 forms of encryption

A

Symmetric encryption- uses the same key to encrypt and decrypt
Asymmetric encryption- uses two different keys, a public key to encrypt data, and a private key to decrypt data.

68
Q

Backup procedure

A

involves making a copy of the data and storing it on a different device in a different location, offsite aor in the cloud

69
Q

Recovery procedure

A

the process of restoring data and/or system states from the backup copy

70
Q

2 ways data is backed up

A

Full backup - a full copy is made of all the data
Incremental Backup - copies of new files and those changed since the last backup

71
Q

AUP (Acceptable use policy)

A

a collection of rules and procedures that users are reuquired to follow. It spells out what constitutes appropriate and inappropriate behaviour.

72
Q

Examples of appropiate behaviour

A
  • Log off or lock the screen before leaving
  • Use a secure passwords and do not disclose it to others.
  • Exercise caution when opening email attachments
73
Q

Examples of inappropiate behaviour:

A
  • Install software downloaded from the web
  • Plug a memory stick into a USB slot
  • Give out confidential information over the phone or email
  • Remove data from the premises without autority
  • Access social media sites in work time
74
Q

2 reasons why users should have an AUP

A
  • It makes users aware of what is and is not acceptable behaviour
  • It stops them wasting time and network bandwidth on personal activities.