3.8 Ethical, legal and environmental impacts of digital technology on wider society, including issues of privacy Flashcards
Cyber security - what is it
Cyber security relates to the protection of digital data on networks, including the internet
Security measures (cyber security) are in regard to three main areas
people
processes
technology
Cyber attack prevention
- people
- Making sure that people understand how to protect their data is an important first step to protecting a network.
- Encouraging people to use strong passwords, not to open emails from unknown addresses, and to back up their data all helps.
Cyber attack prevention
- processes
- An organisation is likely to have a plan in place for what to do if a cyberattack should happen. This
- could be as simple as ensuring data backups are available to rebuild the system, or having technical advisers on hand to help.
Cyber attack prevention
- technology (2)
- Additional network hardware such as firewalls to prevent unauthorised access from outside the network,
- and software such as an intrusion detection system are both examples of using technology to improve the security of a network.
Ethically + environmentally
- importance of cyber security
Ethically: prevents against identity theft, loss/damage to personal or corporate data, protects individual privacy and security.
Environmentally: if industrial or utility systems are hacked, there may be disastrous environmental consequences
2 examples of mobile malware
Just like phishing emails, which trick people into giving personal details, text messages can also be used to trick users into handing over personal information.
Mobile malware can also take the form of Trojan software.
Benefits of mobile technologies
Use in emergencies, convenience, remote working, payments can be accepted wirelessly which is more convenient than physical money, greater access to services (eg. uber when on the go), location flexibility, increased productivity since working can be done when not at a computer
we can stream video and music anywhere we want,
we can connect to the web and receive e-mail whenever we want
How do mobile technologies impact the environment? (2)
- They use large amounts of rare and harmful materials
- Many devices are not sent for recycling but disposed of instead, increasing the demand for these materials
What ethical issues are opened up by mobile technologies?
- Personal privacy issues, with tracking and use of data
- Sharing personal data can have unforeseen, potentially harmful consequences
Positive and negative
- What legal impacts do mobile technologies have?
Positive: mobile technologies can be used to track criminal behaviour and individuals
Negative: mobile technologies open up means for trolling and other abusive or illegal activities
Wired network adv, and disadv. (3, 3)
• Connection speeds are typically faster
• Typically have higher bandwidth
• Typically have better security/fewer
security risks
- Cables can be hazardous and unsightly
- Not all devices can connect via cable eg some tablets
- Can be expensive to set up
Wireless network adv (5)
• Typically lower setup costs
• No wires/cables are required
• It is easy to connect new devices
• Users not confined to a single
location // Users can connect to the network as long as they are within range
• Can connect multiple devices without the need for extra hardware
Wireless network disadv. (5)
• Connection speeds can be slower • Connection speeds can reduce the further from the WAP you are • Subject to interference from walls, objects and other nearby electronic devices • Typically less secure • Connections are not as stable as wired networks
Wired network security issues
Vs wireless
WIRED
• Typically more secure than wireless as need physical access to the network to intercept data
WIRELESS
• Risk of theft of bandwidth by neighbouring users within range
• Risk of data loss/data being stolen unless encryption is used
• Typically easier to intercept data/‘hack’ network // Wireless transmissions can be intercepted by anyone within range of the router
EEL points for anyone allowing wireless access:
- too many
• Websites – need to restrict access to inappropriate websites
• Time – limit amount of time, they may not want to provide indefinite access or may want to
charge for access after the time limit has expired.
• Preventing file sharing and illegal sharing\use of copyrighted materials.
• Accountability – identification of users and actions on a network by preventing anonymous
access.
• Prevention of illegal activities such as terrorism and fraud.
• The responsibility to keep children safe and protected.
• Responsibility to keep users (customers) data safe and secure. Risk that data may be recorded
and used for marketing etc…
• Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in
place, eg filtering of known fraudulent sites. Risk of malware or other risk to hardware
• Recording of private messages or details if not encrypted.
• Recording of usernames and passwords that the user may also use to access other systems.
• Responsibility of organisation to secure their systems from possible attack
There are a number of ways to create extra security for wireless networks that can be used in both home and office networks: (2)
- ensure the wireless network uses encryption, so it is not easy for someone to eavesdrop on the traffic being sent to and from a mobile device
- create a MAC address whitelist so that only specific devices can access a particular network
Benefits of cloud storage
Usually good security, cost-efficiency, convenient, usability and accessibility (simple interface, easy to use), files can be conveniently shared, multiple users can collaborate on one file, cloud storage data can be synced with any device, scalable (you can easily upgrade your storage plan and have the addition of extra storage, without hassle)
- the ability to access files from any location or any device, so long as an internet connection exists
- access can be granted to another user so they can remotely access another person’s data
- reduced need to make backups - cloud storage services back up the data for users
What are some issues associated with cloud storage? EEL!!
- Large data centres use a very large amount of energy to store vast quantities of data
- Many data centres are outside the UK, US and EU where different data protection standards may apply, causing complications (eg. the cloud service provider may be storing data in a different country where the protections you expect in your country may not be there in the other country)
- Many people store personal information using cloud storage which may be vulnerable to hacking or attacks
What are some disadvantages of cloud storage?
- cloud storage hosts could be targeted by hackers
- people have less control over their data
access to data is only - possible with an internet connection - no connection means no access to data
Law introduced in responses to a rise in computer hacking
Computer Misuse Act 1990
- What is hacking
- why is it done
Hacking is the unauthorised access to computer systems and the data they contain. This is sometimes done deliberately to disrupt a system or to steal data and is illegal - it is covered by the Computer Misuse Act 1990.