1A: impact of software Flashcards

(26 cards)

1
Q

what are some issues with inappropriately developed/used software

A
  1. poorly developed software: could include bugs or intentional malware
  2. social networking: widespread concerns for cyber safety/privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the year 2000 problem

A

1960s ~ 1970s: storage was expensive, so 2 digits were used for storing years; the software using this feature crashed and had many incorrect calculations when the 2000s came along

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malware meaning

A

malicious software designed to damage or perform unwanted actions on computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

examples of malware

A

viruses, worms, trojan horses and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a virus

A

malware that replicates itself when executed, and performs malicious processing and duplicates itself; duplicates are passed via email/electronic communication
- commonly attached/embedded in legitimate software/files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how is virus different from other malware

A

the ability to replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a worm

A

type of virus which slows down a system; uses a security flaw in OS to install itself on hard drives; duplicates itself and takes over hard disk + RAM so other programs do not have space to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a trojan horse

A

a type of malware that downloads onto a computer as a legitimate program
- performs unwanted processes when executed, like deleting/corrupting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are trojan horses used for

A

to install malware that enables other user/program to take over your computer; creates botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

botnets + their purpose

A

zombie army: instructs all computers to perform malicious tasks; attacks websites, send spam messages
- provides cover for criminal operator cuz spam is from legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is spyware

A

malware that enters a user’s computer and gathers data to send to third parties without consent
- can be for identity theft and allows criminal to gain access to bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are broad items which rely on software

A

household appliances, all types of motorized transport, utilities, government authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

definition of social networking site

A

an online, virtual community where people share their thoughts and activities with family, friends or those with similar interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advantages of social networking sites

A
  • allows instant messaging on live feeds
  • twitter: can group messages by hashtags
  • LinkedIn: business contacts networking site; business contacts which can be shared with others
  • integration: twitter can be included in Facebook/LinkedIn
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of social networking

A
  • private/personal info easily shared, and can lead to identity theft, stalking, bullying
  • things posted accessible indefinitely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is cyber safety

A

minimizing risk of dangers and security issues regarding use of the internet

17
Q

how to be cybersafe using location based services

A

check privacy settings regularly, turn off location unless specifically required

18
Q

things to watch out for to be cybersafe

A
  • location-based services, unwanted contact, cyberbullying, online friends, digital footprint, online purchasing, identity theft
19
Q

how to deal with unwanted contact

A

unwanted contact: receiving messages/seeing something that makes you uncomfortable
- tell trusted persons, take screenshots for evidence

20
Q

how to deal with cyberbullying

A

ignore/block cyberbully, support a friend if they are being attacked, report to appropriate authority

21
Q

how to deal with online friends

A

do not share personal information, take a trusted adult to meet them in person

22
Q

how to protect digital footprint

A

remember: what is shared online can be made public, and will be accessible forever and this can affect reputation and other things

23
Q

how to deal with online purchasing

A

restrict purchases to well known organizations, examine details/conditions for sale, be wary of ongoing purchases, make sure transactions are encrypted

24
Q

how to deal with identity theft

A

use virus/malware utilities to protect from spyware, use complex passwords which are protected, do not respond to suspicious emails, watch your account for unauthorized transactions

25
what is the problem with so much publicly available information on the internet
information can be biased, unsupported, unverifiable, misleading/incorrect and hard to verify accuracy of
26
questions to ask to help evaluate information
1. who is the author? 2. is the information up to date? 3. who is the intended audience? 4. is info accurate + unbiased? 5. what is the purpose of the information?