Issues and Impact Flashcards
(40 cards)
What are some environmental issues associated with the use of digital devices
- Energy consumption
-> Big company servers need a lot of energy to maintain.
-> This can release CO2 as air pollution. - Manufacture
-> Takes a lot more energy than running and replacing. - Replacement cycle
-> Upgrades in capability fuel consumeristic ideology, driving short replacement cycles.
-> People should keep using devices for longer, through donation, refurbishment, etc. - Disposal
-> Takes up space in landfills
-> Increases potential for leakages and fires in landfill
-> Valuable metals and plastics can be recycled
What are some ethical and legal issues associated with the collection and use of personal data
- Privacy
- Ownership
- Consent
- Misuse
- Data protection
Data can often be used to discriminate against certain groups/individuals.
Fake news and cyberbullying feed off shared data.
What are some ethical and legal issues about AI, machine learning and robotics
- Accountability
- Safety
- Algorithmic bias
- Legal liability
What are some threats posed to digital systems by malware
Loss of important data / Fraud
What are some methods of intellectual property protection for computer systems/software
Protecting IP means that the original work is not stolen or copied by other parties.
- Copyright - Creative works
- Patents - Inventions
- Trademarks - Brand
- Licensing - Only certain people can access content
What are some methods of protecting digital systems and data
- Anti malware
- Encryption
- Acceptable use policies
- Backup
- Recovery procedures
Viruses
Worms
A piece of code which can self-replicate and typically has a detrimental effect, e.g., corrupting the system or destroying data.
Trojans
A program that appears harmless, but is, in fact, malicious
Ransomware
A form of malware which encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment
Keyloggers
Software that obtains covert information about another computer’s activities by silently monitoring and recording their keystrokes.
Social engineering
How can sensitive data be protected?
Encryption
Access control
Physical security
Authentication
Backup and Recovery
Encryption
the process of converting data into an illegible, scarabled format so it cannot be understood by unauthorsised parties.
Access control
Users have different levels of access to systems (like read/write/delete permissions on file management)
Physical Security
Common measures include fire detection and suppression systems, CCTV, locks, biometrics, and ensuring that the hardware is in a safe location.
Authentication
The process of checking the identity of an individual attempting to gain access to a network
Multi-factor authentication
Multi-factor authentication requires you to give:
- Something you know, e.g. ID, pin, password
- Something you have, e.g. keyfob, USB
- Something you are, e.g. retina scan, fingerprint, biometrics
Machine learning
The ablity of an algorithm/program to process data and derive new meaning from it.
AI
the ability of a digital device to mimic the functions of the human mind and adapt to a new situation.
Algorithmic bias
Behaviours in computer algorithms and programs that create unfair outcomes.
Benefits of AI
- Can label X rays as cancerous or non cancerous and design treatment
- Speech recognition
- Predictive analytics of fraud
- Space exploration and autonomous robots
- Manufacturing due to automation
Drawbacks of AI
- Algorithmic bias producing unwanted outcomes
- Automation changing workforce requirements
- Human reliance of algorithmic outcomes without questioning the reliability or accuracy of the algorithms
Digital footprint
A trail of places that you have visited on the internet, e.g. the activities you have taken part in.