ICT in engineering/computer ethics & legal issues/components & functions of computer systems Flashcards
week 1,2 and 3
what do we use mobile devices for?
texting messages, sending emails, gaming, shopping and learning online
what does ict stand for
information communication technology
what does information mean in ict
-knowledge obtained from studying, investigating, reading or researching.
the tools used to transmit information are telephone, television, radio, computer, phone.
-helps us fufill our daily tasks
what does communication mean in ict
-act of transmitting messages, it is a process whereby information is exchanged between indviduals using symbols, signs or verbal interaction,
-communication helps us gain knowledge
what is technology mean in ict
-use of scientific knowledge, experience and resources to create processes and products that meet human needs
-important In communication
what 2 components is ICT made of?
computer technology and communication technology
why is ict useful in engineering?
- design new products/systems
-minimise cost
-minimise power consumption
-minimise time to market
-maximise yield
what activities do engineers coordinate
-simulation
-modelling
-prototyping
-manufactoring
-testing
-installation
-project management
what goals to engineers apply ICT to achieve
-eliminating flaws
-reducing variation
-minimising iterations
what does engineering generally focus on?
-designing products /systems
-building
-testing
-commissioning
-decommissioning
what role does ICT play in engineering
- enhancing delivery
- electronic communication
- creation of virtual prototypes
- analyses of stresses
-cost analysis
-improvement to efficiency
what are the 3 legal issues
-computer misuse
- data protection
-intellectual property
what legal issue is related to computer crime
computer misuse act 1990
what legal issue is related to protecting personal data
data protection act 1998
what are the 2 types of intellectual property
copyright and patents
what is the definition of computer crime
-a crime involving computers and network
- can be defined as the unlawful acts whereby the computer is either a tool or target or both
who can computer criminals be?
-authorised employees
-employees who were not authorised to use a computer system
-outside users - hackers/crackers
-an organisation’s competitors
why do we care about computer crime?
it is important for computing professionals to understand cyber terrorism for their benefit and society as a whole
what are the types of computer crime?
-hardware / software theft
-hacking
-spamming
sniffing
-denial of service attack
-identify theft (phishing and skimming)
what is hardware theft?
- act of stealing computer equipment
examples of hardware theft?
-opening computers and taking parts out of them
-hardware theft happens in retail stores, breaking in , opening the package and shoplifting
what is software theft?
-unauthorised duplication and/or use of computer software
examples of software theft
- Physically steal a media that contain the software
- Remove or disable the programs that have been written from the company computers. Programmers are the ones that cause this disturbance
Software is stolen form the software manufactures, and later is duplicated for sale in black market (also known as piracy)
what is the definition of hacking?
any action that leads to unathorized interference with a computer, computer system or network. a hacker writes or uses ready made programs to break into a computer
what are some types for hacking
- stealing financial information
-stealing personal info
-damage/modify data
-launch computer attacks
-gaining access
-transit a virus via malicious software
what is spamming
Automated sending of large quantities of unsolicited e-mails to recipients.
why does spamming exist?
This may be for marketing purposes
Can disrupt or disable network
what is sniffing
Is the electronic eavesdropping on electronic data transmissions
This may be of e-mails or of data which might be used for financial gain, for e.g., credit card details
what is denial of service attack
An attempt to make a machine or network resource unavailable to its intended users
what is identity theft?
The fraudulent acquisition and use of person’s private identifying information, usually for financial gain
what are the two types of identity theft?
phishing and skimming
what is phishing?
technique to fish for information that you would not disclose to others such as bank details, card details, PIN numbers, national insurance number, passport number
what is an example of phishing?
an email asking you to click on a link, visit the site and verify or update some personal information, the email appears to be legitimate, making you feel comfortable enough to give information.
what is skimming?
illegal copying of information from the magnetic strip of a credit or ATM card using electronic device known as skimmer, once scammers have skimmed your card they can create a fake card with your details on it before starting to run charges on your account. this is done without knowledge o original card holder
what are some examples of legalisation as a response to computer crimes and abuses
computer misuse act 1990
computer misuse amendment bill 2002
what is computer misuse act 1990
made it illegal to attempt to make unathorised access or changes to computer material
what 3 specific offences does the computer misuse act define
Sect 1: Unauthorised access to computer material is the basic offence of hacking
Sect 2: Unauthorised access with intent to commit or facilitate commission of further offences (comes in when the hacking leads to another offence (e.g. theft))
Sect 3: Unauthorised modification of computer material (covers the use viruses, worms; also phishing and Denial service of attack
what is privacy?
Privacy is the ability of an individual/group to stop data or information about themselves from becoming known to people other than those whom they choose to give access
what was introduced to counter privacy issues
UK introduced the Data Protection Act (1994, 1998) and the Data Protection Act 2018 which is the UK’s implementation of the General Data Protection Regulation (GDPR)
what is the data protection act 2018
Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.
what are the rights under the data protection act 2018
These include the right to:
- be informed about how your data is being used
- access personal data
- have incorrect data updated
- have data erased
- stop or restrict the processing of your data
- data portability (allowing you to get and reuse your data for different services)
- object to how your data is processed in certain circumstances
You also have rights when an organisation is using your personal data for:
- automated decision-making processes (without human involvement)
- profiling, for example to predict your behaviour or interests
what is intellectual property?
Intellectual property (IP) is intangible property created by an individual or organisation
such as Literary works, music, video, art, designs, inventions and trademarks
why is intellectual property called “intellectual”
It is called “intellectual” property because it is the product of human imagination, creativity, and inventiveness
why is it important to protect your intellectual property?
Protecting your intellectual property makes it easier to take legal action against anyone who steals or copies it, with an aim of making profit.
The type of protection you can get depends on what you have created
what are the two types of protection?
copyright and patents