ethics in tech general Flashcards
Black hat hacker
Someone who violates computer or Internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems)
Cracker
An individual who causes problems, steals data, and corrupts systems
Malicious insider
An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations
Industrial spy
An individual who captures trade secrets and attempts to gain an unfair competitive advantage
Cybercriminal
Someone who attacks a computer system or network for financial gain
Hacktivist
An individual who hacks computers or websites in an attempt to promote a political ideology
Cyberterrorist
Someone who attempts to destroy the infrastructure components of governments, financial institutions, and other corporations, utilities, and emergency response units
Why are computer incidents so prevalent?
bring your own device (BYOD) policies
a growing reliance on software with known vulnerabilities
and the increasing sophistication of those who would do harm have caused a dramatic increase in the number, variety, and severity of security incidents
zero-day exploit
a cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.
deontology
emphasizes moral obligation and describes principles that govern action,
the Ethics of Logical Consistency and Duty,
virtue ethics
focus on human character as the centre of moral activity
communitarianism
centers on the interdependence we have for all of life and people
utilitarianism
greatest benefit for the greatest number of people, happy consequences
“finding the mean” in virtue ethics
acting virtuously requires a balance between excess and deficiency.
utility in utilitarianism
utility is the greatest happiness principle, hard to determine what consequences should be considered
ransomware
malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
virus
a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
worm
Unlike a computer virus, which requires users to spread infected files to other users, a worm is a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email. A worm is capable of replicating itself on your computer so that it can potentially send out thousands of copies of itself to everyone in your email address book.
trojan horse
a seemingly harmless program in which malicious code is hidden. A victim on the receiving end of a Trojan horse is usually tricked into opening it because it appears to be useful software from a legitimate source,
blended threat
a sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.
How to spam legally?
spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.
DDos Attack
a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. A DDoS attack does not involve infiltration of the targeted system. Instead, it keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in—the Internet equivalent of dialing a telephone number repeatedly so that all other callers hear a busy signal.
root kit
a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.
APT or advanced persistent threat
a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time (weeks or even months). Attackers in an APT must continuously rewrite code and employ sophisticated evasion techniques to avoid discovery.