Issues and Impact Flashcards
What are some environmental issues associated with the use of digital devices
- Energy consumption
-> Big company servers need a lot of energy to maintain.
-> This can release CO2 as air pollution. - Manufacture
-> Takes a lot more energy than running and replacing. - Replacement cycle
-> Upgrades in capability fuel consumeristic ideology, driving short replacement cycles.
-> People should keep using devices for longer, through donation, refurbishment, etc. - Disposal
-> Takes up space in landfills
-> Increases potential for leakages and fires in landfill
-> Valuable metals and plastics can be recycled
What are some ethical and legal issues associated with the collection and use of personal data
- Privacy
- Ownership
- Consent
- Misuse
- Data protection
Data can often be used to discriminate against certain groups/individuals.
Fake news and cyberbullying feed off shared data.
What are some ethical and legal issues about AI, machine learning and robotics
- Accountability
- Safety
- Algorithmic bias
- Legal liability
What are some threats posed to digital systems by malware
Loss of important data / Fraud
What are some methods of intellectual property protection for computer systems/software
Protecting IP means that the original work is not stolen or copied by other parties.
- Copyright - Creative works
- Patents - Inventions
- Trademarks - Brand
- Licensing - Only certain people can access content
What are some methods of protecting digital systems and data
- Anti malware
- Encryption
- Acceptable use policies
- Backup
- Recovery procedures
Viruses
Worms
A piece of code which can self-replicate and typically has a detrimental effect, e.g., corrupting the system or destroying data.
Trojans
A program that appears harmless, but is, in fact, malicious
Ransomware
A form of malware which encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment
Keyloggers
Software that obtains covert information about another computer’s activities by silently monitoring and recording their keystrokes.
Social engineering
How can sensitive data be protected?
Encryption
Access control
Physical security
Authentication
Backup and Recovery
Encryption
the process of converting data into an illegible, scarabled format so it cannot be understood by unauthorsised parties.
Access control
Users have different levels of access to systems (like read/write/delete permissions on file management)
Physical Security
Common measures include fire detection and suppression systems, CCTV, locks, biometrics, and ensuring that the hardware is in a safe location.
Authentication
The process of checking the identity of an individual attempting to gain access to a network
Multi-factor authentication
Multi-factor authentication requires you to give:
- Something you know, e.g. ID, pin, password
- Something you have, e.g. keyfob, USB
- Something you are, e.g. retina scan, fingerprint, biometrics
Machine learning
The ablity of an algorithm/program to process data and derive new meaning from it.
AI
the ability of a digital device to mimic the functions of the human mind and adapt to a new situation.
Algorithmic bias
Behaviours in computer algorithms and programs that create unfair outcomes.
Benefits of AI
- Can label X rays as cancerous or non cancerous and design treatment
- Speech recognition
- Predictive analytics of fraud
- Space exploration and autonomous robots
- Manufacturing due to automation
Drawbacks of AI
- Algorithmic bias producing unwanted outcomes
- Automation changing workforce requirements
- Human reliance of algorithmic outcomes without questioning the reliability or accuracy of the algorithms
Digital footprint
A trail of places that you have visited on the internet, e.g. the activities you have taken part in.
Active data collection
Information that you choose to release by sharing information online using websites or social media.
Passive data collection
Web browsing activity and information stored via cookies
Cookies
A small text file created when you access a website.
Identity theft
Stealing someone’s personal information or possessions with the intent of using your identity.
Identity fraud
Using someone else’s identity for financial gain.
Data misuse
Data that has been collected legitimately, not stolen, but which has been misused.
Consent for data use must be:
- Specific
- Informed
- Able to be revoked or denied
Information must be used:
- Fairly, lawfully, transparently
- Specified purposes
- Adequate, relevant
- Limited to only what is necessary
- Accurate and kept up to date
- Kept for no longer than necessary
- Handled in a way that ensures appropriate security, including protection against unlawful access
Rights of data subject:
- [The right to] Be informed
- Access
- Rectification
- Erasure
- Restrict processing -
- Data portability
- Object
- In relation to automated decision making and profiling
Static heuristic
Decompile and look for source code, and compare against heuristic database of existing, known viruses.
Dynamic heuristic
Lets the program run in a controlled situation (sandbox) while antivirus observes actions. Strange actions e.g. deleting files and duplicating, is blocked, quarantined, considered a virus.
Acceptable Use Policy
A collection of rules and procedures that employees are required to follow in order to protect their organisation’s systems and networks.
Pretexting
Creating and using an invented scenario to engage a targeted victim to increase the chance they will divulge information/perform actions that would not usually occur.
Phishing
Sending emails purporting to be from reputable companies to incite people to reveal personal information. Often has links that resemble the real webpage, but if checked carefully, the web address is not your usual. Provides hacker with personal information.
Baiting
The promise of cash or goods that people with malicious intent use to entice victims e.g. offering free music or movie downloads to trick users into revealing their login credentials.
Quid pro quo
Quid pro quo
Very similar to baiting, except the benefit is usually in the form of a service as opposed to cash or goods. QPP means “something for something”. Provides a benefit in exchange for information.