Ethics test TWO Flashcards

1
Q

What is the foundation of healthcare ethics?

A

Belmont report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Belmont report

A

Ethical principles and guidelines for the protection of human subjects”

The cornerstone of ethical principles upon which the federal regulations are based
* Respect for persons
* Beneficence
* Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the legal and ethical standards around patient data?

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIPAA

A

A major goal to assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide and promote high-quality health care and to protect the public’s health and well-being.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are tough ethical issues in healthcare?

A

Abortion/genetic screening of embryos
Allocation of healthcare resources
Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Beauchamp & Childress’s Healthcare versus natural law counterparts***

A

Autonomy versus Freedom
Benefice versus Care
Nonmaleficence versus Respect
Justice versus Impartiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Moschella’s points response to mr. bill

A

The principles of Beauchamp and Childress are not that helpful in their attempt to be value-free and tend to collapse to the principle of Respect for autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Natural law response to mr bill

A

the right to make a free choice is not everything (it’s instrumental) It is important to make the right choice. Also, remember the rejection of the subjectiveness thesis (what is good for me is good.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mr. Bill situation

A

Bill is an 80-year-old widower who previously had a pacemaker installed to regulate his heartbeat. The pacemaker is not painful or burdensome. Bill’s heart no longer works on its own, turning off the pacemaker will kill Bill. Bill has witnessed some memory issues and is scared to end up with Alzheimer’s like his wife, therefore he wishes to have his pacemaker turned off.
* Should Bill’s doctor agree to his request?
* What ethical principles or framework are you basing your response on?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Natural law (who did what and why?)

A

Object: (the main immediate goal)
End (Intended purpose)
Circumstances (mitigating factors) All must be good for the action to be good (Principle of perfection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Natural law judging actions

A

Impermissible (violates respect for persons’ basic human goods)

Permissible (the default)

Obligatory (promote care and positivity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Natural law Norms

A

Positive (you should…)
Presence of negative norms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scientistic -ethics of human enhacement technologies

A

Push the science pedal to the metal its out destiny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ulitarian- ethics of human enhacement technolgies

A

for humanity as a whole, are HET a positive or negative? benefit the whole good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Healthcare-ethics of human enhacement technologies

A

(Beauchamp and Childress)
Autonomy-patients right
Beneficance-promote good
Nonmaleficence: do no harm
Justice: treat all patients equally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Natural law-ethics of human enhancement technologies

A

Treatment versus enhancement

Contribution to or inhibition of human flourishing (Elberg’s approach)

Dealing with the induvial human person and how they personally achieve human flourishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Michael Bess says pursue what is good and avoid what is bad, what ethical system would this be related to when talking about human enhacement technologies?

A

Natural law ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Erberls analysis on human enhacement technolgies is not based on treatment versus enhacement, rather?

A

On whether human enhacement technolgies promote human flourishing

Does not consider societal disruptions like kiling fetus and embryos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does Eberle distinguish between illicit “post humans” and the enhanced more actualized humans?

A

If this enhancement is associating with the basic human good is enhanced actualized humans and changing basic human goods would be illicit post humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does Eberls worldview relate to slack and wise?

A

Slack and wise state perceptual dissatisfaction is when the body is overcoming the limitations, but we should just meet the basic needs, Eberle says overcoming the limitations of the body is okay just as long as it’s for the basic human goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Eberls main points on HET and moraliy
Cognitive

A

drugs (nootropics) neural stimulation, supplements, computer programs, brain computer interfaces

Eberle says licit unless they detract from human agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Eberls main points on HET and morality
Physical

A

plastic surgery, performance enhancing drugs, exoskeletons, pacemakers, organ replacement, gene therapy

Eberle said these are licit if not for vanity or athletic completeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Eberls main points on HET and morality
Emotive

A

mood enhancers

Eberle states that they should be limited to treating clear maladies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Eberls main points on HET and morality
Moral

A

reduce aggression, xenophobia, self-centeredness.

Eberle states that they are ONLY acceptable if they lead to authentic improvement in character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Neuralink (and similar) example of one of these technologies

A

Bluetooth implant in the head to help people with disabilities is undeniable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Issues arise with the neurolink bluetooth

A
  • What about enhancing healthy people?
  • What about being able to both read and write to the brain?
  • Does this promote flourishing of the many or control by the few.
  • Beware the “bait-and switch”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Neuralink Roadmap

A
  1. Mind mouse
  2. Artificial eye
  3. Control of limbs
  4. Cyborgs
  5. Data security, brain hacking
  6. Defeating the Borg or becoming the Borg? WWED?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Transhumanism

A

a movement which advocates for the enhancement of the human condition by developing and making widely available sophisticated technologies able to greatly enhance longevity, mood, and cognitive abilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The end goal of transhumanism

A

defeat suffering, pain, disease, inequality, and death though biotechnology implants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Posthumanism defections

A

one being that humans will become immortal through some sort of upload, or cyborg technology. Possibly humans would be replaced by a successor non-biological “species”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Is a transhuman future already inevitable?

A

Smartphones as extensions of ourselves

Prosthetics, neural implants, interest of bodies

Microchipping

Vaccine, passports, digital IDs

Metaverse AR/VR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Is resistance to transhumanism useless?

A

Politcail parties, the amish, ted “unabomber” kaczynski model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Transhumanism as religion

A

Scientistic

No afterlife, but eternal earthly life

Perfectibility of man and society

Technology as savior

Limiting body ad essential digitizable mind

Death and suffering useless, wrong

We are (can be) gods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Christianity as religion

A

Supernatural

Afterlife (heaven or hell)

Fallen nature of humanity

Christ as savior

Holy body soul

Death and suffering have purpose

God is our creator, him alone should we serve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Technolgies of genetic engineering

A

Genetic testing/screening/selection

In-Virto fertilization (IVF)

Gene manipulation (Cas-9)

Cloning

Genetically modified foods (GMO)

Designer babies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Moral libetranism on genetic engineering

A

Parents will have the right to do with their pregnancies, free will, and autonomy would make something moral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Natural law on genetic engineering

A

Will be opposed to many of these technologies, especially IVF the catholic church has been against this for a while, this would break up the holistic system of family and marriage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Utilitarnism on gentic engineering

A

Way the pros and cons of these genetic technologies, whatever will produce the greatest pleasure will be morally right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Do you have to stay consistent with one ethical system?

A

Yes, can not change with situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Why you do you can be a problem?

A

Judgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Eugenics

A

Set of beliefs and practices that aim to improve the genetic quality of the human population by selecting desirable traits and eliminating undesirable ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Eugenics positive measures

A

such as encouraging people with certain characteristics to reproduce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Eugenics negative measures

A

such as preventing or sterilizing with other characteristics from reproducing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Hard eugenics

A

nazi Germenary, usually why eugenics has a bad reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Soft eugenics

A

preserves someone’s free will but peoples decisions would be consistent with eugenic ends

(examples: the cultural disapproval of the god children in Gattaca or the Down syndrome testing in Denmark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

“Curing” down syndrome

A

The Danish practice described in the article provides mothers with a down syndrome diagnosis to use in deciding whether to have an abortion

Nearly all expecting mothers take the test. After a down syndrome diagnosis 95% choose to abort. As a result, down syndrome is becoming very rare in Denmark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Who does the danish curing down syndrome benefit?

A

Parents, children, society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Gattaca

A

Sex selection
genetic selection
De facto discrimination based on genetics
Secret DNA checks of potential partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Can the danish testing program become a success? how do thoughts on abortion come into play?

A

Yes, however abortion can be issue because you are still killing a life no matter if they have down syndrome or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Euthanasia

A

an act of intentional killing. It is distinguished from withdrawing a futile or harmful treatment in “let someone die.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The ultimate battleground for contemporary moral theories?

A

euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Who is involved in euthanasia?

A

Patient and her agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is being done in euthanasia?

A

Killing the patient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Why is euthanasia being done?

A

To relieve the patient from suffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Natural law perspective euthanasia

A

**Voluntary active euthanasia VIOLATES natural law according to basic natural logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Utilitarian perspective euthanasia

A

Kill the patient to decrease misery in the world. Other choices? Should family and friends get a veto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Deontological argument

A

A norm against euthanasia is irrational (Gomes Logos disagrees, gives example of the lorry truck driver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Autonomy perspective euthanasia

A

Gomez logos says autonomy becomes comprised when patient is in dire condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Does natural law always agree with autonomy?

A

No, natural law says that autonomy can sometimes be naturally wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Physicians or others shouldnt be expected to kill people because?

A

They have autonomy themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

“Euthanasia is the ultimate failure to care for someone in need.”

A

Gomez logo says to value family and friends and live a longer life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Medical assistance in dying agrees with what theory?

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

To qualify for Medical assistance in dying you must…

A

Be eligible for health services funded by a province or territory

Be at least 18 years old and mentally competent

**Have a grievous and irremediable medical condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Does a patient need to have a fatal or terminal medical condition to be considered for medical assistance in dying?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A patient with a mental illness wants to know if they qualify for medical assistance in dying, what would the response be?

A

No you are not eligible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Imperfected members of society who cannot afford the cost of living, would they be considered for medical assistance in dying?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

False binary

A

suffer or die

3rd options: pallative care, social services, family and community support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Silppery slopes and other concerns with assisted dying

A

Death as an acceptable problem-solving option for individuals and society

State sponsorship provides financial and other incentives saves the government money

Eventual perception of natural deathers as selfish and antisocial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

CS lewis (ancient wisdom)

A

Honor the father and mother

To care for parents

Children old men, the poor, and the sick should be considered as the lords of the atmosphere

You will see them take care of widows, orphans, and old men never reapproaching them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A good death from natural law perspective

A

Respects one’s dignity

Recognizes that all human life is valuable including people viewed by some as useless

Minimizes needless suffering

Christian perspectives: life is a gift from God from conception to natural death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Studies find what type of correlation with social media, and well being?

A

Negative correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Social media for self presentation

A

bad: comparing to others
good: reviewing your own profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Social media for sharing emotions

A

good: using as source of support;
bad: cyberbullying, trolling, and spreading hate

74
Q

The disposition of the person on social media affects the degree to which?

A

social media detracts from or supports human flourishing

75
Q

Some studies found that social media supports and reinforces?

A

real world-same people

76
Q

Examples negative association between social media and wellbeing but as causation

A

Facebook usage: giving likes, posting, clicking on likes

Measures of well-being: life satisfaction, self-report, mental health, self-reported physical health, BMI

77
Q

Facebook data findings showed?

A

Facebook negatively associated with overall well-being, especially mental health

Amount of use a key factor (“quality” of use not so much)

Online relationships no substitute for the real world

78
Q

The social dilemma

A

Explores the harmful impact of social media on society

Insiders describe how the design of the social media platforms nurtures addition, manipulates emotions, and opinion, and spreads incorrect, misleading, or socially harmful information

79
Q

Social media apps are free because?

A

we are the product

80
Q

The busiess model with social media

A

give away something useful or fun for free (personal info) for the purpose of collecting user behavioral data to target ads (or serve ads)

81
Q

Natural law on social media

A

Basic human goods and related norms

The “do not guideline”

The “go guideline”

82
Q

Intellectual property

A

Describes *works of the mind that are distinct and owned or created by a single person or group

83
Q

Intellectual property is the idea that the owner controls and recievers compenstation for the use of their intellectual property. t/f

A

true

84
Q

Intellectual property is protected through?

A

Copyright, patent, trade secret laws, trademarks

85
Q

Intellectual property issues

A

plagiarism, reverse engineering, open source, competitive intelligence, cybersquatting

86
Q

Subversive minority position

A

the concept of intellectual property is wrong-headed and detracts from human flourishing

87
Q

Examples of IP

A

Inventions, books, movies, music, computer programs, apps

88
Q

How is IP different from physical property?

A

People try to copy IP, which differs it from physical property because you need more protection on IP (copyrights, patents) than P

89
Q

How does natural law support arguements for and against IP protection?

A

Natural law would observe it to be wrong to steal IP, so they would promote protection of those objects.
However, it promotes human flourishing “the cure to cancer,” it would be unethical to keep that to yourself.

90
Q

Why do you think the trend is for legal protections to be strengthen/lengthened?

A

Enhancing technology, and money to have legal protection

91
Q

Copyright IP

A

protects authored works such as art, books, film, music

Exclusive right to distribute, display, perform, reproduce an original work in copies or prepare derivate works based on the work

92
Q

Copyright infringement

A

violation of the rights secured by the owner of a copyright

93
Q

Copy rights extended in 1978

A

95 years after publication date

94
Q

Eligibility for copyright for IP

A

Works should be original and must fall within one of the categories in title 17 of the US

literacy works, computer programs, online writing, musical works, pictorial works, graphics, scripture, movies, sound recordings

95
Q

Fair use doctrine

A

Allows portions of copyrighted materials to be used without permission

Depends on purpose, character, natura, relation, and effect of the copyrighted work

96
Q

Software copyright protections

A

Proving infringement requires showing resemblance that could be explained only by copyrighting

97
Q

Patent law

A

protects inventions

98
Q

Prior art patent law **

A

the existing body of knowledge available to a person of ordinary skill in the art (something know to the people of the art cannot be patent)

99
Q

Patent infringement

A

unauthorized use of another’s patent

100
Q

title 35 of US code has

A

laws for granting and enforcing patents

101
Q

Things that CANT BE patented

A

Abstract ideas, laws of nature, natural phenomenon

102
Q

Length of utility patent

A

20 years from filing

103
Q

What is a utility patent?

A

Protects the functional aspects of an invention such as how it works or a chemical formula

EX: a new wheel for a car, a new chemical compound, new method of making toast

104
Q

Which is stronger utility or design patent?

A

Utility

105
Q

Design patent length

A

15 years from granting

106
Q

What is a design patent?

A

Protects the appearance and ornamental characters of an object

EX: shape of coke bottle, apply iPhone icons, Nike swoosh logo

107
Q

Leahy-smith America invents act

A

Changed the patent system from a first to invent to first inventor to file

Expanded the definition of prior art used to determine the novelty of an invention and whether it can be patented

Made it more difficult to obtain a US patent

108
Q

Cross licensing agreements

A

Each part agrees not to sue the other over patent infringements

*Small tech business at a disadvantage in this area

109
Q

In patent disputes the small company usually settles and licenses its patents to large company to?

A

avoid the cost of litigation

110
Q

Trade secret laws on IP

A

protects information critical to an organizations success but doesn’t involve filing information with the government in advance

111
Q

Trade secret laws charateristics

A

*Secret business information THE SECERT FORMULA

Represents something of economic value

Has required effort or cost to develop

Has some degree of uniqueness or novelty

Is generally unknown to the public and is kept confidential

112
Q

advantages of trade laws on IP

A

No time limits on the protection of trade secrets

No need to file an application make disclosures to any person or agency or disclose a trade secret to outsiders to gain protection

Trade secrets cannot be ruled invalid by the courts

113
Q

Whats the difference between patents and trade laws?

A

Patents have to be publisized the secret information rather trade laws are confidential and unknown to the public

114
Q

Examples of IP that need trade secert coverage

A

KFC chicken secret formula, chemicals in fast food, what’s in coke

115
Q

Protecting trade secerts-uniform trade secrets act

A

Established uniformity across the states in trade secret law

116
Q

Protecting trade secrets-economic espionage act

A

Imposes penalties for the theft of trade secrets

117
Q

Protecting trade secrets-Nondisclosure clauses

A

Prohitbs employees form reveling company secrets

118
Q

Protecting trade secrets- noncompete agreemet

A

Prohibits an employee from working for any competitors for a period

Must be viewed as reasonable by a count but varies by state

119
Q

Trademark enables

A

a consumer to differentiate one’s company’s products from another’s

120
Q

Examples of trademarks

A

Logo, package design, phrase, or word, that enables a phrase a consumer to differentiate one company’s products from anothers

121
Q

Trademarks can be renewed?

A

forever as long as it is in use

122
Q

IP and natural law

A

IP protections attempt to recognize the rights of creators and the common good

IP protections reflect that in our human nature incentives matter, and without these incentives the common good suffers

123
Q

IP protections also recognize that finical incentives arent everything and?

A

If you have something good it should be shared at some point (plus fair use)

124
Q

The case agasint IP is made by

A

boldrin and levine

125
Q

The case agasint IP

A

This is a minority position

IP really means intellectual monopoly

IP stifles innovation and creativity and does not serve the common good

Controls use after sale

Barriers to entry for new firms

Higher prices for consumers

126
Q

boldrin and levine state alterantives to IP are

A

Patronage
Crowfunding
Subscriptions

127
Q

Controversy with IP

A

are the financial incentives created through IP law protections necessary for new products and services to be created? How best is the common good served?

128
Q

Pharmceuticals without IP protection

A

Companies would seek first-mover advantages

Competition

Knowledge diffusion leading to more development

Social recognition and prestige attracting talent and capital

Voluntary contractual agreements

Historical examples: 19th and 20th century Italy and Switzerland

129
Q

Ethical decisions with hacking and virsuses

A

are involved in determining which information systems and data most need protection

130
Q

hackers

A

test the limitations of information systems out of intellectual

131
Q

White hat hacker

A

authorized

132
Q

Black hat hacker

A

unauthorized

133
Q

Grey hat hacker is ?

A

unauthorzied but hacks for good intentions

134
Q

Grey hacking viewed by ethics-ultiarnism

A

Act Ultraism-pleasure/pain calculation of the act

Rule uliteralism-pleasure/pain calculation of the rule

135
Q

Greay hacking viewed by NL

A
  1. Adherence to the precedence of negative norms would say hacktivism is unethical due to the “object”
  2. Prudential judgement is required in extreme cases where the negative norm to be broken is of minor importance relative to an extreme duty of care
136
Q

Lammers or script kiddies

A

terms used to refer to technically inept hackers

137
Q

Mallicious insiders

A

employees, consultants, contractors, have some form of collusion (cooperation between an employee and an outsider)

138
Q

Negative insiders

A

Poorly trained and inadequately managed employees who cause damage accidently

139
Q

industrial spies competitive intelligence

A

legally obtained data gathered using sources available to the public

140
Q

Industiral spies, esponiage

A

Using illegal means to obtain information that is not available to the public

141
Q

cybercriminals

A

Hack into computers to steal and engage in computer fraud

142
Q

Data breches by cybercriminals

A

Unintended release of sensitive data or the access of sensitive data by unauthorized induvial

143
Q

Hacktivists

A

Hack to achieve a political or social goal

144
Q

Cyberterroists

A

Launch computer-based attacks to intimidate or social objectives

Use techniques that destroy or disrupt services

Consider themselves not to be at war

Have a very high acceptance of risk

Seek maximum

145
Q

Organizations need a multiplayer process for

A

managing security vulnerabilities

146
Q

Computer forensics

A

Key to fighting computer crime in court of law

147
Q

ACM code of ethics

A

section outlines fundamental ethical principles that form the basis for the remainder of the code

148
Q

ACM code of ethics code:

A

Contribute to society and well-being

Avoid harm

Be honest and trustworthy

Be fair and act not to discriminate

Respect the work required to produce new ideas, inventions, creative works, and computing artifacts

Respect privacy

Honor confidentiality

149
Q

Hospital Ransome attack articles

A

hacking affect local health systems, reflected the need for backup systems, and need for protection and contingency plans

150
Q

Paper charting in hospital introduces

A

Complex patient care

151
Q

Disclosure

A

disclosing the details on the situation

152
Q

Secrecy

A

Covering attacks up

153
Q

Why are computer incidents so prevelant?

Increasing complexity

A

increase vulnerability

Number of entry points to a network expands continually, increasing the possibility of security breaches

154
Q

Why are computer incidents so prevelant?

Cloud computing

A

Environment where software and data storage are provided via internet, plus for computer security

155
Q

Why are computer incidents so prevelant?

Virtualization software

A

operates in a software layer that runs on top of the operating system

Enables multiple virtual machines to run on a single computer

156
Q

Why are computer incidents so prevalent?

Bringing your own device

A

business policy that permits employees to use their own mobile devices to access company computing resources and applications

157
Q

Exploit

A

Attack on an information system that takes advantage of a particular system vulnerability

158
Q

Types of exploits
virus

A

piece of programming code, disguised something else, that causes a computer to behave in an unexpected and undesirable manner

159
Q

types of exploits
Worm

A

harmful program that resides in the active memory of the computer and duplicates itself

160
Q

types of exploits
Trojan horse

A

program in which malicious code is hidden inside a seemly harmless program

161
Q

trojan horse-logic bomb

A

executes when it is triggered by a specific event

162
Q

types of exploits
Spam

A

abuse of email systems to send unsolicited emails to large numbers of people

163
Q

Spam-
CAPTCHA

A

(completely automated public turing est to tell computers and humans apart

164
Q

Types of exploits
Distributed denial of service attack:

A

Causes computers to flood a target site with demands for data and other small task

165
Q

Types of exploits
Rootkit

A

 Enables user to gain administrator level access to a computer without users’ consent

166
Q

Types of exploits
Phishing

A

Fraudulently using emails to try to get the recipient to reveal personal data

167
Q

Types of phishing
spear phishing

A

phisher sends fraudulent emails to certain organizations employees

Emails are designed to look like they come from high level executives within the organization

168
Q

Types of phishing
Smishing

A

leigitmate-looking test messages sent to people telling them to call a specifc phone number or to log on to a web site

169
Q

Types of phishing
Vishing

A

victims receive a voice mail telling them to all a phone number or access a website

170
Q

Zero day attack

A

: takes place before the security comm

unity or software developer knows about the vulnerability or has been able to repair it

171
Q

Botnet

A

Group of computers which are controlled from one or more remote locations by hackers without the knowledge or cost of their owners

172
Q

Zombies

A

Computers that are taken overused to distribute spam and malicious code

173
Q

National Institute of standards and technology

Identify

A

Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities

174
Q

National Institute of standards and technology

Protect

A

Implement appropriate safeguards to ensure delivery of critical infrastructure services

175
Q

National Institute of standards and technology

Detect

A

develop and implement appropriate activities to act regarding a detected cybersecurity event

176
Q

National Institute of standards and technology

Respond

A

Develop and implement appropriate activites to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event

177
Q

Prevention

Install a corporate firewall

A

Limit network access based on the organizations

178
Q

Prevention

Intrusion detection system

A

Monitors system and network resources and activites, notifies network security personnel when network traffic

179
Q

Prevention

Antivirus software

A

scans for a specific sequence of bytes, known as a virus signature indicates the presence of a specific virus

180
Q

Prevention

Department of homeland security

A

aims to secure critical infrastructure information systems

181
Q

Detection systems

A

Catch intruders in the act

Minimize the impact of intruders

182
Q

Ethical issues

A

Allocation of resources to computing security

Communication of data breachers

Hacktivism

Natural law or other rules-based approaches versus the utilitarian greatest good