Final Flashcards

(84 cards)

1
Q

What does SDLC stand for? What does it consist of?

A

Software Development Life Cycle. It consists of analysis, design, development, testing, and implementation phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do systems fail?

A
  1. Lack of clear goals and specifications
  2. Poor management and communication among customers, designers, programmers etc.
  3. Pressure for unrealistically low bids, budget, time.
  4. Very new/unreliable technology.
  5. Inflexible, expensive, and undocumented legacy systems
  6. Refusal to take accountability
  7. Lack of manual failsafes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Therac-25

A

A machine that caused massive overdoses in radiation and death due to system errors.

The name comes from 25 MeV.

Company: AECL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are error explanations important?

A

Ambiguous error codes are not only hard to interpret, but the nature of the error and why it happened/what the consequences are become impossible to pin down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Radioactive Products

A

In the early 20th century, radium was put on a cultural pedestal and products such as radioactive toothpaste, bread, etc became popular. They had extreme adverse effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Error

A

Sometimes, the WAY that a specific user interacts with a system can cause errors. Professional will handle the program in a different way.
Example: speed of input affects outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Problems with Therac

A

One coder for 20,000 lines of code
Old/reused code
Unaware of bugs
Lack of testing
Reusing variables
Over-confident programmers
Hard to decipher error codes
Lack of mechanical locks/manual input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Professional Techniques to increase Reliability and Safety

A

Certification for software engineers
Proper testing of user interfaces and human factors
Redundancy and self-checking
Real-world testing with real users
Management and communication
Organization principles: risk management and loose structure (employee can talk to management and CEO easily)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User Interfaces and Human Factors to increase Reliability and Safety

A

Provide clear instructions and error messages - feedback
Be consistent with expected result
Input validation
Moderate workload (not boring)
Backup computers
Voting redundancy - same results from different environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Increasing Reliability and Safety - Testing

A

Small changes must be thoroughly tested system-wide
Independent verification and validation
Beta testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intellectual Property

A

Intangible creative work.
Value from creativity, ideas, research, skills, labor, non-material efforts and attributes the creator provides.
Protected by copyright and patent law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patent

A

Gives an inventor the right to exclusive use of their invention for 20 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trademark

A

Protects the unique name, design, logo, symbols, or colors used by a business to identify their products or services forever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Copyright

A

Protects creative and artistic expressions i.e. books, drawings, paintings, computer programs and music for life + 70 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does new technology make copyright infringement easier or harder?

A

Easier.
Compression tech allows for copying large files.
Search engines make finding material easier.
Peer-to-peer tech makes sharing files easier.
Video streaming/file transfer via broadband is easier.
Cameras etc. allow recording events.
Scanners can convert print, photos, and artwork to electronic form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the constitution say about copyright?

A

It gives congress the power “To promote the progress of science and useful arts, by securing for limited time to authors and inventors the exclusive rights to their respective writings and discoveries.”
Article I Section 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Copyright holder’s exclusive rights

A

Make copies
Produce derivative works (translations, movies from books)
Distribute copies
Perform work in public (music, plays)
Display work in public (art, movies, computer games, video on web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fair Use Doctrine

A
  1. Purpose and nature of use (commercial and nonprofit)
  2. Nature of the copyrighted work (creative or factual)
  3. Amount and significance of portion used.
  4. Effect of use on potential market or value of the copyright work (will it reduce sales of work?)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Digital Rights Management

A

Techniques that control the uses of IP in digital formats.
Hardware and software schemes using encryption.
Producer of file may specify what a user may do with it.
Different DRM schemes used by Apple, Microsoft, and Sony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Banning, Suing, and Taxing

A

Banning/delaying tech via lawsuits i.e. CD-recording devices, DVD players, and portable MP3 players.
Require that new tech include copyright protections
Taxing digital media to compensate the industry for expected losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DMCA

A

Digital Millennium Copyright Act:
Anti-circumvention and safe harbor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Anti circumvention

A

Prohibit circumventing tech access controls and copy-prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Safe harbor

A

Protect websites from lawsuits for copyright infringement by users. Take down notices by the industry require sites to comply in order to not violate copyright.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DeCSS

A

A free computer program that could decrypt content on commercially produced DVDs.
Banned in the U.S.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Copyright Clearance Center
Organization set up to collect and distribute royalty fees so users don't have to search out individual copyright holders.
26
Revenue Sharing
A legal means for obtaining inexpensive music and generating revenue for the industry and artists. It allows content-sharing sites to enable the posting of content and share their ad revenues with content owners in compensation
27
Free Software
Idea advocated and supported by a large, loose-knit group of computer programmers who allow people to copy, use, and modify their software. Free to use, not lack of cost
28
Open Source
Software distributed or made public in readable and modifiable source code.
29
Hacking - General
Intentional, unauthorized access to computer systems
30
Hacking - Phase 1
60s - 70s "The joy of programming" Hacker = creative programmer who wrote elegant or clever code. Hack = clever piece of code.
31
Hacking - Phase 2
70s - 90s Negative connotation Breaking into computers without authorized access. Spread computer worms, viruses, and 'phone phreaking'. Companies used hackers to analyze and improve security.
32
Hacking - Phase 3
mid 90s - present Growth of the Web made viruses and worms fast and widespread. Hacktivism DoS attacks Large scale theft of personal/financial info
33
Hacktivism
Political hacking that began in phase 3. Promotes a political cause. Sometimes considered a form of civil disobedience/gray area.
34
DoS/DDoS attack
Denial-of-service attack used to shut down a Web site. Distributed-denial-of-service attack - a botnet floods a host with traffic simultaneously
35
White hat hacker
Hackers who use their skills to demonstrate system vulnerabilities and improve security.
36
Hacking as Foreign Policy
Hacking by governments has increased. The Pentagon has announced that it will treat some cyber attacks as acts of war/respond with military force.
37
Stuxnet
An extremely sophisticated worm that targets a particular type of control system. Damaged equipment in a uranium enrichment plant in Iran.
38
Factors that contribute to security weaknesses
1. History of the Internet and the Web 2. Inherent complexity of computer systems 3. Speed at which new applications develop 4. Economic and business factors 5. Human nature
39
Firewalls
Used to monitor/filter out communication from untrusted sites that fit a profile of suspicious activity.
40
CFAA
Computer Fraud and Abuse Act - Covers gov. computers, financial/medical systems, and activities that involve computers in more than one state (connected to Internet) It is illegal to access a computer without authorization. Expanded to include unauthorized data collection.
41
PATRIOT act
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. Expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems.
42
Catching and Punishing Hackers
1. Law enforcement agents read hacker newsletters/participate in chat rooms undercover. 2. Honey pot sites to attract, record and study hackers. 3. Computer forensics specialists can retrieve evidence from computers even after deletion/erasure. 4. Investigators trace viruses and hacking attacks by using ISP records and router logs
43
Why do security breaches occur?
Poorly written software or poorly configured networks and applications.
44
Identity Theft
Committing crime with someone else's personal information (credit/debit card, SSN) 18-29 year olds are vulnerable Made easier through E-commerce.
45
Techniques used to steal personal and financial information
Phishing (email), smishing (text), vishing (voice) Pharming Publicly available data
46
Phishing/smishing/vishing
Requests for personal and financial information disguised as legitimate business communication.
47
Pharming
False Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers.
48
Responses to Identity Theft
1. Authentication of email, Web sites, and customers. 2. Encryption to securely store data. 3. Fraud alerts on credit reports. 4. Third party payment methods.
49
Biometrics
Biological characteristics unique to an individual & can't be stolen. Used in high security settings (airport personnel). Difficult to fool.
50
Multifactor Authentication
Something you know (password/pin), are (biometrics), or have (SMS or key fob).
51
What happens when someone violates another country's laws?
They could be prosecuted in the other country. Websites that promote activity illegal in some countries may be sued.
52
BC
Business Continuity - A plan of action to be taken before, during and after a disruption to ensure regular business. What, who, how and when of a recovery plan.
53
DR
Disaster Recovery - a subset of BCP that involves restoring vital support systems (communications, hardware, IT assets). Minimize business downtime & focus on getting technical operations back to normal ASAP.
54
What are the main components of Business Continuity?
Priority business processes Team contact info Staff/office requirements Continuity steps BCP documentation
55
Essential Business Process
Primary mission statement, support other organization's EBP, must be recovered quickly, high value, high business impact, political ramifications, legal requirements.
56
Computer Virus
Attached to an executable file & infects computers when a malicious program is ran or opened. Requires human action to spread from one computer to another via programs or files.
57
Worm
Sub-class of a virus that can travel without human intervention using file or information transport features on a system. It copies itself en masse and sends itself anywhere it can. Causes Web servers, network servers, and computers to stop responding.
58
Trojan horse
Not a virus but a destructive program that looks legitimate. Opens a backdoor to give malicious users and programs access and allow information theft.
59
Social Engineering
Psychological manipulation of people to perform actions that lead to a leak of proprietary of confidential information or damages. One technique is to pretend to be a figure of authority.
60
Spear Phishing
An email targeted at a specific individual or department.
61
Botnet
A collection of compromised computers that can be controlled by remote perpetrators to perform attacks.
62
Ransomware
Malware designed to deny access to a system or data until a ransom is paid. Spread via phishing or infected websites.
63
Malware
Malicious software
64
Spyware
Software that aims to gather information about a person or organization and send it to another entity without consent. Can record keystrokes, control webcam, etc.
65
Failures due to design and development problems
Inadequate attention to safety risks Interaction with physical devices that do not work as expected Incompatible software/hardware or OS Not planning or designing for unexpected inputs or circumstances Confusing user interfaces Software bugs and reuse of software/code
66
Failures due to management and use problems
Data-entry errors, inadequate training of users, errors in interpreting results or output, failure to keep information in databases up to date, overconfidence in software by users.
67
Safety-critical applications to increase Reliability and Safety
Identify risks and protect against them Convincing case for safety Avoid complacency
68
Specifications to increase Reliability and Safety
Learn the needs of the client Understand how the client will use the system
69
Wikipedia
Written by volunteers and susceptible to bias. Writers are usually educated experts.
70
Wisdom of the crowd
Rating systems are easy to manipulate. Unreliable information spreads easily, especially on the web.
71
Vulnerable viewers
Less educated individuals & children
72
Abdicating responsibility
People let computers do their thinking & may rely on them over human judgement.
73
Evaluating models
Models necessarily involve assumptions and simplifications of reality. Results or predictions may not closely correspond with the real world.
74
Why models may not be accurate?
Incomplete knowledge of the system being modeled. Incomplete or inaccurate data. Inadequate computing power. Difficult/impossible to quantify variables representing human values and choices.
75
Criteria when evaluating information
Source/authority Purpose Currency (date) Accuracy
76
Digital Divide
New tech only available to the wealthy, but the time it takes for it to become commonly available is decreasing. Cost & ease of use. Have vs have not or level of service?
77
Digital Divide solutions
Entrepreneurs provide low cost options for people who cannot afford. Government funds tech in schools. Non-profits and computer companies spread access to developing countries. Requires both money and ingenuity for computers to work in extreme environments. Respecting existing culture.
78
Criticisms of Computing Technologies
Massive unemployment and de-skilling of jobs. We use computers because we can, not because they satisfy real needs. They don't solve real problems. Social inequity and disintegration: weaken communities and isolate people. Separation from nature and destruction of the environment Benefits for big business & government Stunt child development, human values, and intellectual skills.
79
Non-Luddites
Technology reduces the effort needed to produce goods and services. Tech means improvements in wealth and living standards.
80
Luddites
Technology eliminates jobs and reduces the cost of production without improving our lives. Tech means massive unemployment, skewer profits, and poorer quality of life. Humans vs nature.
81
Accomplishments of technology
Increased life expectancy, elimination or reduction of diseases, increased standard of living, assistance for the disabled.
82
Singularity
A point at which AI or some human-machine intelligence advances so far that we cannot comprehend it. Cannot prepare for aftermath, only gradual developments. Decision making process should produce what people want.
83
Definition of AI
Generally defined as technology that allows computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Also make predictions, recommendations, or decisions influencing real or virtual environments.
84
Risks and threats of AI
1. Mass data collection can lead to misuse and/or breach of privacy 2. Biased and discriminatory decision-making 3. Job displacement 4. Too complex for us to analyze accountability and fairness. 5. Susceptible to cyberattacks that manipulate outputs. 6. Misinformation and manipulation on the public 7. Unintended negative outcomes 8. Data poisoning