1.6: ETHICAL, LEGAL, CULTURAL AND ENVIRONMENTAL IMPACTS OF DIGITAL TECHNOLOGY Flashcards

1
Q

what is a stake holder?

A

anyone who is impacted by the actions of an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are ethics?

A

moral principles, or rules, which govern a person’s attitudes and behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what do Ethical issues in computing include? (2)

A
  • ensuring public safety

- security of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the term ‘cultural issues’ mean?

A

computer matters that have an effect on the nature and culture of society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

examples of cultural issues: (2)

A
  • the digital divide

- the changing nature of employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how does the digital divide affect younger and older people?

A

younger people may embrace new technology more than older members of society
-as they sometimes fear technology and feel excluded because they cannot use or understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do financial situations often contribute to the digital divide?

A

the UK is prosperous with high standards of living, but many people live in countries where access to computers is expensive and simply unaffordable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how do living areas contribute to the digital divide?

A

people in cities tend to have access to high-speed broadband, while those in rural or remote areas often do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do IT skills contribute to the digital divide?

A

Many employers now require good IT skills, and jobseekers who lack those skills may find it difficult to gain employment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

discuss the changing nature of employment (2)

A
  • employees work from home and communicate via technology
  • Automation of processes using technology has led to a fall in manual, low-skilled work, such as warehouse packing. On the other hand, more high-skilled work is now available, which includes the maintenance of automated systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

discuss the meaning of ‘environmental issues’ in the computing sector?

A

Environmental issues are those where the manufacturing and use of computers has had a negative impact on the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is an issue that arises from using powerful computers? (such as web servers, domain name servers and data centres) (2)

A
  • need to be left running continuously.

- This requires lots of energy to maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

discuss the (dis &) advantage of creating newer devices

A

computers already have a heavy impact on the environment, which is unlikely to decrease in the near future.

However, many devices are now more power efficient than their predecessors and some companies have come up with innovative ways to save power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does the internet make illegal activities easier? give an example of this?

A

internet allows people to commit crimes remotely.

For example, a hacker could gain access to a computer on the other side of the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what do new technologies bring? and what are legislations needed for?

A

New technologies bring new crimes.

Legislation is needed to cover new technologies and protect the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

state the 6 rules of the data protection act of 2018

A

personal data must:

  • be fairly and lawfully processed
  • be obtained for specified, explicit and legitimate purposes
  • be adequate, relevant and not excessive
  • be accurate and up to date
  • not be kept for longer than is necessary
  • be handled in a way that ensures security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the purpose of the data protection act 2018?

A

developed to control how personal or customer information is used by organisations or government bodies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the purpose of the computer misuse act 1990?

A

designed to protect computer users against harmful attacks

19
Q

3 rules of the computer misuse act 1990:

A
  1. Unauthorised access to computer material.
  2. Unauthorised access with intent to commit or facilitate commission of further offences.
  3. Unauthorised access with intent to impair, or modify data
  4. Making, supplying or obtaining anything which can be used in computer misuse offenses
20
Q

what does the Copyright, Designs and Patents Act 1988 exists to do?

A

gives the creator of published material the control over the way it is used.

21
Q

what is copy right?

A

A set of rights that prevents people copying and distributing a piece of work without the copyright holder’s permission.

22
Q

what does copyright give copy right users?

A

exclusive rights to publish, copy, distribute and sell their creation

23
Q

what is a license?

A

A legal agreement between the company that published the software and the end user covering areas such as copyright.

24
Q

what happens when you purchase an item with a license?

A

copyright holder grants permission for you to use it as part of the sale.

25
Q

what is malware?

what does it do?

A

Malicious software designed to cause harm to a network or computer system.
Attaches itself to programs or files on a computer or server.

26
Q

what can malware affect?

A

all components of an operating system

27
Q

what are the 5 main types of malware?

A

Viruses, Worms, Trojans, Spyware & Ransomware

28
Q

define ‘viruses’:

  • how do they work?

- how do they often cause harm?

A
  • Programs embedded (hidden) within other files.
  • They replicate themselves and become part of other programs.
  • Viruses often cause damage by deleting or modifying data.
29
Q

define ‘worms’:

-how do they often spread?

A
  • Programs similar to viruses except that they are not hidden within other files.
  • Worms often spread through emails.
30
Q

define ‘Spyware’:

-how do they often cause harm?

A
  • Programs that monitor user activities (such as websites visited, usernames and passwords used)
  • send the information back to a hacker.
31
Q

define ‘Ransomware’:

-how do they work and how do they often cause harm?

A
  • Programs that attempt to blackmail a user into making a payment to a hacker.
  • they encrypt documents and will not decrypt them until a ransom is paid.
32
Q

define ‘phishing/ social engineering’:

A

The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company,

-Commonly involves tricking users into breaking normal security procedures over phone, email or in person.

33
Q

define ‘brute force attack’:

A

Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.

34
Q

define ‘Denial Of Service Attack’:

what does it use?

A
  • attempts to flood a website server with an overwhelming number of data requests to crash or disrupt network sites.
  • Uses a number of computers over a network of infected machines which send requests.
35
Q

define ‘data theft/ interception’:

  • how does data travel?
  • what could happen to them?
  • how could data also be stolen?
A

Data travels across networks in packets

Packets can be intercepted.

Data can also be intercepted physically, for example portable hard drives and other external hardware can be stolen

36
Q

define ‘Structured query language (SQL) injection’:

-what code can be used to delete all data?

A

Malicious code entered into a website form to gain unauthorized access to data by modifying websites security forms.
-‘DROP TABLE’

37
Q

differences between open source and proprietary software?

A
  • Open source software can be free of copyright and is usually available to anyone.
  • Proprietary software is copyrighted and only available under licence.
38
Q

how could malware be prevented? (2)

A

Anti-Malware - searches for, detects, and removes viruses, and other malicious software.​

Firewall - prevents unauthorised access / hacking into the network.

39
Q

how could phishing/ social engineering be prevented? (2)

A

Firewalls - Filters web content or downloading files by stopping unauthorised traffic entering and leaving a network.

Limit user access levels/privileges – prevent users from downloading files.​

40
Q

how could a brute force attack be prevented? (2)

A

Strong Passwords / Captcha​

Preventing number of login attempts or using captcha form for brute force.

41
Q

how could you prevent a DDOS attack? (2)

A

Limit the number of login attempts or requests using captcha form.​

Adding filters to router to drop packets from obvious sources of attack.

42
Q

how could you prevent data theft/ interception? (2)

A

Encryption - jumble/scramble/mix up the data // turns it into cypher text eg; Caesar Cipher, If it is accessed it cannot be understood​

Physical Security – Locks on doors, CCTV, Security Guards etc.

43
Q

how could you prevent an SQL injection? (2)

A

Penetration testing should be undertaken/vulnerabilities should be found.​

Limit user access levels/privileges since restriction limits the actions a user can take, thereby reducing potential threats.