1A: impact of software Flashcards

1
Q

what are some issues with inappropriately developed/used software

A
  1. poorly developed software: could include bugs or intentional malware
  2. social networking: widespread concerns for cyber safety/privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the year 2000 problem

A

1960s ~ 1970s: storage was expensive, so 2 digits were used for storing years; the software using this feature crashed and had many incorrect calculations when the 2000s came along

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malware meaning

A

malicious software designed to damage or perform unwanted actions on computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

examples of malware

A

viruses, worms, trojan horses and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a virus

A

malware that replicates itself when executed, and performs malicious processing and duplicates itself; duplicates are passed via email/electronic communication
- commonly attached/embedded in legitimate software/files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how is virus different from other malware

A

the ability to replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a worm

A

type of virus which slows down a system; uses a security flaw in OS to install itself on hard drives; duplicates itself and takes over hard disk + RAM so other programs do not have space to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a trojan horse

A

a type of malware that downloads onto a computer as a legitimate program
- performs unwanted processes when executed, like deleting/corrupting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are trojan horses used for

A

to install malware that enables other user/program to take over your computer; creates botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

botnets + their purpose

A

zombie army: instructs all computers to perform malicious tasks; attacks websites, send spam messages
- provides cover for criminal operator cuz spam is from legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is spyware

A

malware that enters a user’s computer and gathers data to send to third parties without consent
- can be for identity theft and allows criminal to gain access to bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are broad items which rely on software

A

household appliances, all types of motorized transport, utilities, government authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

definition of social networking site

A

an online, virtual community where people share their thoughts and activities with family, friends or those with similar interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advantages of social networking sites

A
  • allows instant messaging on live feeds
  • twitter: can group messages by hashtags
  • LinkedIn: business contacts networking site; business contacts which can be shared with others
  • integration: twitter can be included in Facebook/LinkedIn
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

disadvantages of social networking

A
  • private/personal info easily shared, and can lead to identity theft, stalking, bullying
  • things posted accessible indefinitely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is cyber safety

A

minimizing risk of dangers and security issues regarding use of the internet

17
Q

how to be cybersafe using location based services

A

check privacy settings regularly, turn off location unless specifically required

18
Q

things to watch out for to be cybersafe

A
  • location-based services, unwanted contact, cyberbullying, online friends, digital footprint, online purchasing, identity theft
19
Q

how to deal with unwanted contact

A

unwanted contact: receiving messages/seeing something that makes you uncomfortable
- tell trusted persons, take screenshots for evidence

20
Q

how to deal with cyberbullying

A

ignore/block cyberbully, support a friend if they are being attacked, report to appropriate authority

21
Q

how to deal with online friends

A

do not share personal information, take a trusted adult to meet them in person

22
Q

how to protect digital footprint

A

remember: what is shared online can be made public, and will be accessible forever and this can affect reputation and other things

23
Q

how to deal with online purchasing

A

restrict purchases to well known organizations, examine details/conditions for sale, be wary of ongoing purchases, make sure transactions are encrypted

24
Q

how to deal with identity theft

A

use virus/malware utilities to protect from spyware, use complex passwords which are protected, do not respond to suspicious emails, watch your account for unauthorized transactions

25
Q

what is the problem with so much publicly available information on the internet

A

information can be biased, unsupported, unverifiable, misleading/incorrect and hard to verify accuracy of

26
Q

questions to ask to help evaluate information

A
  1. who is the author?
  2. is the information up to date?
  3. who is the intended audience?
  4. is info accurate + unbiased?
  5. what is the purpose of the information?