Issues and Impact Flashcards

1
Q

What are some environmental issues associated with the use of digital devices

A
  • Energy consumption
    -> Big company servers need a lot of energy to maintain.
    -> This can release CO2 as air pollution.
  • Manufacture
    -> Takes a lot more energy than running and replacing.
  • Replacement cycle
    -> Upgrades in capability fuel consumeristic ideology, driving short replacement cycles.
    -> People should keep using devices for longer, through donation, refurbishment, etc.
  • Disposal
    -> Takes up space in landfills
    -> Increases potential for leakages and fires in landfill
    -> Valuable metals and plastics can be recycled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some ethical and legal issues associated with the collection and use of personal data

A
  • Privacy
  • Ownership
  • Consent
  • Misuse
  • Data protection

Data can often be used to discriminate against certain groups/individuals.
Fake news and cyberbullying feed off shared data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some ethical and legal issues about AI, machine learning and robotics

A
  • Accountability
  • Safety
  • Algorithmic bias
  • Legal liability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some threats posed to digital systems by malware

A

Loss of important data / Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some methods of intellectual property protection for computer systems/software

A

Protecting IP means that the original work is not stolen or copied by other parties.

  • Copyright - Creative works
  • Patents - Inventions
  • Trademarks - Brand
  • Licensing - Only certain people can access content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some methods of protecting digital systems and data

A
  • Anti malware
  • Encryption
  • Acceptable use policies
  • Backup
  • Recovery procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Viruses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

A piece of code which can self-replicate and typically has a detrimental effect, e.g., corrupting the system or destroying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojans

A

A program that appears harmless, but is, in fact, malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

A form of malware which encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keyloggers

A

Software that obtains covert information about another computer’s activities by silently monitoring and recording their keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can sensitive data be protected?

A

Encryption
Access control
Physical security
Authentication
Backup and Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

the process of converting data into an illegible, scarabled format so it cannot be understood by unauthorsised parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access control

A

Users have different levels of access to systems (like read/write/delete permissions on file management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Security

A

Common measures include fire detection and suppression systems, CCTV, locks, biometrics, and ensuring that the hardware is in a safe location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authentication

A

The process of checking the identity of an individual attempting to gain access to a network

18
Q

Multi-factor authentication

A

Multi-factor authentication requires you to give:

  • Something you know, e.g. ID, pin, password
  • Something you have, e.g. keyfob, USB
  • Something you are, e.g. retina scan, fingerprint, biometrics
19
Q

Machine learning

A

The ablity of an algorithm/program to process data and derive new meaning from it.

20
Q

AI

A

the ability of a digital device to mimic the functions of the human mind and adapt to a new situation.

21
Q

Algorithmic bias

A

Behaviours in computer algorithms and programs that create unfair outcomes.

22
Q

Benefits of AI

A
  • Can label X rays as cancerous or non cancerous and design treatment
  • Speech recognition
  • Predictive analytics of fraud
  • Space exploration and autonomous robots
  • Manufacturing due to automation
23
Q

Drawbacks of AI

A
  • Algorithmic bias producing unwanted outcomes
  • Automation changing workforce requirements
  • Human reliance of algorithmic outcomes without questioning the reliability or accuracy of the algorithms
24
Q

Digital footprint

A

A trail of places that you have visited on the internet, e.g. the activities you have taken part in.

25
Q

Active data collection

A

Information that you choose to release by sharing information online using websites or social media.

26
Q

Passive data collection

A

Web browsing activity and information stored via cookies

27
Q

Cookies

A

A small text file created when you access a website.

28
Q

Identity theft

A

Stealing someone’s personal information or possessions with the intent of using your identity.

29
Q

Identity fraud

A

Using someone else’s identity for financial gain.

30
Q

Data misuse

A

Data that has been collected legitimately, not stolen, but which has been misused.

31
Q

Consent for data use must be:

A
  • Specific
  • Informed
  • Able to be revoked or denied
32
Q

Information must be used:

A
  • Fairly, lawfully, transparently
  • Specified purposes
  • Adequate, relevant
  • Limited to only what is necessary
  • Accurate and kept up to date
  • Kept for no longer than necessary
  • Handled in a way that ensures appropriate security, including protection against unlawful access
33
Q

Rights of data subject:

A
  • [The right to] Be informed
  • Access
  • Rectification
  • Erasure
  • Restrict processing -
  • Data portability
  • Object
  • In relation to automated decision making and profiling
34
Q

Static heuristic

A

Decompile and look for source code, and compare against heuristic database of existing, known viruses.

35
Q

Dynamic heuristic

A

Lets the program run in a controlled situation (sandbox) while antivirus observes actions. Strange actions e.g. deleting files and duplicating, is blocked, quarantined, considered a virus.

36
Q

Acceptable Use Policy

A

A collection of rules and procedures that employees are required to follow in order to protect their organisation’s systems and networks.

37
Q

Pretexting

A

Creating and using an invented scenario to engage a targeted victim to increase the chance they will divulge information/perform actions that would not usually occur.

38
Q

Phishing

A

Sending emails purporting to be from reputable companies to incite people to reveal personal information. Often has links that resemble the real webpage, but if checked carefully, the web address is not your usual. Provides hacker with personal information.

39
Q

Baiting

A

The promise of cash or goods that people with malicious intent use to entice victims e.g. offering free music or movie downloads to trick users into revealing their login credentials.

40
Q

Quid pro quo

A

Quid pro quo

Very similar to baiting, except the benefit is usually in the form of a service as opposed to cash or goods. QPP means “something for something”. Provides a benefit in exchange for information.