Computer Ethics and Legal Issues Flashcards

1
Q

What is computer Crime?

A

It is an unlawful act whereby the computer is either a tool or target or both. It involves computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are computer criminals?

A

Computer criminals can be:
Authorised Employees
Unauthorised employees
Outside users- hackers and crackers
An organisations competitors
Others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is it important to understand computer crime?

A

It is important for computing professionals to understand cyber-terrorism for their benefit, and society as a whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is theft of hardware?

A

Stealing computer equipment such as stealing from stores or taking parts out of computers which you do not own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is theft of software?

A

The unauthorised use, duplication or distribution of software such as programs or media which contain the software. Think of piracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is hacking?

A

Any action which results in unauthorised interference with a computer, computer systems or network by writing or using programs to break into a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are is hacking used for?

A

Stealing financial information.
stealing personal information
Damage or modifying data
Launch computer attacks
Gain access to other computers
Transmit a virus or run malicious softwatr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is spamming?

A

This is the sending of large quantities of unsolicited emails to recipients. This may be used for marketing or disrupting and disabling networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is sniffing?

A

Electronic eavesdropping on electronic data transmissions ie emails of data or credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DOS attack?

A

Denial of Service attack is an attack designed to make a machine or network resource unavailable to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is identity theft?

A

The fraudulent acquisition and use of a person’s private identifying information. The most common form of this is used for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of identity theft?

A

Phishing and Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phishing?

A

A technique used to ‘fish’ for information that would not normally be disclosed to others i.e. Bank account details, credit card details, National Insurance Number, Passport number and Social security number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of phising?

A

Emails which lead you to a site asking you to confirm or update some of your personal details. The site usually looks identical to the real company website which is used to trick you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is skimming?

A

The illegal copying of information from the magnetic strip of a credit or automated teller machine using an electronic device used as a skimmer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of computer crime?

A

Identity theft: Phising/skimming
Sniffing
Spamming
DOS attack
Hacking

17
Q

How have countries responded to computer crime using legislation?

A

Computer Misuse Act (1990)
Computer Misuse Amendment Bill (2002)

18
Q

What is the computer Misuse act (1990)

A

Made it illegal to (attempt to) make unauthorised access or changes to computer material
Act defines three specific offences:
Sect 1: Unauthorised access to computer material is the basic offence of hacking
Sect 2: Unauthorised access with intent to commit or facilitate commission of further offences (comes in when the hacking leads to another offence (e.g. theft))
Sect 3: Unauthorised modification of computer material (covers the use viruses, worms; also phishing and Denial service of attack

19
Q

What is privacy?

A

The ability of an individual or group to stop data or information about themselves from becoming known to people other than those whom they choose to give access

20
Q

How has the UK countered the breach of privacy?

A

Data Protection Act (1994, 1998) and the Data Protection Act 2018 which is the UK’s implementation of the General Data Protection Regulation (GDPR) which came into force on 25 May 2018.
These new data protection regulations replace the previous Data Protection Act 1998 (DPA) and set guidelines for the processing and collection of personal information.

21
Q

What is the data protection Act (2018)?

A

Under, The Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you. These include the right to:
be informed about how your data is being used
access personal data
have incorrect data updated
have data erased
stop or restrict the processing of your data
data portability (allowing you to get and reuse your data for different services)
object to how your data is processed in certain circumstances
You also have rights when an organisation is using your personal data for:
automated decision-making processes (without human involvement)
profiling, for example to predict your behaviour or interests

22
Q

What is intellectual property?

A

Intangible property created by an individual or organisation. It is called intellectual property because it is the product of human imagination creativity and inventiveness.

23
Q

What types of Intellectual Property Protection exist?

A

The two main types are copyright and patents

24
Q

What does copyright cover?

A

Comes into effect automatically - protects the expression or manifestation of an idea (not the idea itself)
Covers traditional documents like books, music articles, movies/TV
Also covers computer software, databases, designs and multimedia
Authors may license others to produce copies, often in return for royalties
Whilst software is automatically copyright, this does not prevent others from writing their own code to implement the same ideas (reverse engineering – developing a new device from a set of devices, objects…). So, copyright does not protect ideas, but only the expression of ideas.

25
Q

What is a patent.

A

It is a more powerful way of protecting intellectual property. A patent protects your invention and lets you take legal action against anyone who makes, uses, or sells your invention without your permission

26
Q

What does Patent cover?

A

Protects the idea behind an invention
The ideas should be original and not obvious
A new, useful and inventive step
Sometimes we want people to use our inventions so as to make them better
Patents are published, thus benefiting public knowledge

27
Q

What is computer ethics?

A

Computer ethics concerns how computers, systems, and technology are used by principles of right conduct and morals. It is doing the right thing according to societies standards.

28
Q

What are some ethical issues in companies?

A

Organisations collecting huge data of employees and clients and then using this data to gain competitive advantage or by selling it/

29
Q

What is ethics at brunel?

A

“Any research that involves human participation, the collection or study of their data, organs and/or tissue, and that is carried out on Brunel University premises and/or by Brunel University staff or Brunel University students under the supervision of Brunel University staff requires ethical approval.” (Brunel University research ethics committee, 2005, p. 3).
Particularly relevant for your final year project
Need to conform to BCS code
Also advise following guidelines from British Psychological Society (BPS, 2004). Specifically regarding:
Consent
Withdrawal
Confidentiality

30
Q

What is your right to consent in research?

A

Whenever possible, the investigator should inform all participants of the objectives of the investigation. The investigator should inform the participants of all aspects of the research or intervention that might reasonably be expected to influence willingness to participate. The investigator should, normally, explain all other aspects of the research or intervention about which the participants enquire…’

31
Q

What is your right to withdrawal in research?

A

‘At the onset of the investigation investigators should make plain to participants their right to withdraw from the research at any time, irrespective of whether or not payment or other inducement has been offered…’
‘In the light of experience of the investigation, or as a result of debriefing, the participant has the right to withdraw retrospectively any consent given, and to require that their own data, including recordings, be destroyed…’

32
Q

What is right to confidentiality in research?

A

‘Subject to the requirements of legislation, including the Data Protection Act, information obtained about a participant during an investigation is confidential unless otherwise agreed in advance…Participants…have a right to expect that information they provide will be treated confidentially and, if published, will not be identifiable as theirs…’

33
Q

How can you secure yourself from being a victim of cyber crime?

A

Install anti-virus software
Install updates
Choose strong passwords and don’t share
Encrypt sensitive data
Make regular data back-ups
Wipe all data before disposal/resale

34
Q

Summary of keyfacts

A

DP applies to all electronic data and all organisations must comply
Intellectual property is intangible property produced by an individual or organisation
Copyright protects the manifestation of an idea, but not the idea itself and is automatic
Patents protect novel ideas/inventions but must be applied for
Breaching the license terms of software or data is copyright infringement, even if it was supplied without charge