Ethics Flashcards

1
Q

What are Meta-ethics

A

What is the nature of moral judgements (universal, relative, nihilist)? Why should one be moral?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Normative ethics

A

How can we answer ethical questions systematically?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Applied ethics

A

Provides answers to specific issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Virtue ethics

A

Focuses on the character of a person rather than actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtues (5x)

A
  • Clementia (mercy)
  • Discipline
  • Frugality (not wasteful)
  • Industria (hard working)
  • Veritas (truthfulness)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dante deadly vices (7x)

A
  • Pride
  • Jealousy
  • Wrath
  • Sloth
  • Avarice (greed)
  • Gluttony
  • Lust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Normative ethics

A

Utilitarianism What makes most people happy?
Intellectualism What gives the most knowledge
Welfarism Most economic output
Egoism What’s best for me

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

deontology

A

Regelwerk erstellen, und dann danach vorgehen. Muss für alle stimmen, so wie “you shall not kill”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

law and ethics

A

Set of written rules and associated sanctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA & AAA

A

Confidentiality best way is to delete the data
Availability best way is to publicate it
Integrity Richtigkeit, nicht verändert
Authenticity Echtheit / Rechtsgültigkeit
Accountability Verantwortlichkeit
Auditability Nachvollziehbarkeit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk

A

risk = r = v * p = value * probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack Keywords

A

Vulnerability - Eine schwachstelle
Threat - Possible danger that might exploit the vulnerability
Attack - Attempt to expose, disable or gain access to information
Exploit - Action that takes advantage of vulnerability
Incident - Event that could lead to loss of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerckhoffs principle

A

System is secure even if everything except the key is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Entropy

A

Informationsgehalt einer Nachricht. 128 bits entropy, then we need 2128 bruteforce attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker Origins

A

(Ex-) Insider, Competitor, Hacktivist, Criminal, State, Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack Objectives

A

Fame, Stealing Information, modifying, abusing, hiding, …

17
Q

Vulnerability origins

A

Hardware, Software, Network, Host, Humans, Environment