Issues and Impact Flashcards
What are some environmental issues associated with the use of digital devices
- Energy consumption
-> Big company servers need a lot of energy to maintain.
-> This can release CO2 as air pollution. - Manufacture
-> Takes a lot more energy than running and replacing. - Replacement cycle
-> Upgrades in capability fuel consumeristic ideology, driving short replacement cycles.
-> People should keep using devices for longer, through donation, refurbishment, etc. - Disposal
-> Takes up space in landfills
-> Increases potential for leakages and fires in landfill
-> Valuable metals and plastics can be recycled
What are some ethical and legal issues associated with the collection and use of personal data
- Privacy
- Ownership
- Consent
- Misuse
- Data protection
Data can often be used to discriminate against certain groups/individuals.
Fake news and cyberbullying feed off shared data.
What are some ethical and legal issues about AI, machine learning and robotics
- Accountability
- Safety
- Algorithmic bias
- Legal liability
What are some threats posed to digital systems by malware
Loss of important data / Fraud
What are some methods of intellectual property protection for computer systems/software
Protecting IP means that the original work is not stolen or copied by other parties.
- Copyright - Creative works
- Patents - Inventions
- Trademarks - Brand
- Licensing - Only certain people can access content
What are some methods of protecting digital systems and data
- Anti malware
- Encryption
- Acceptable use policies
- Backup
- Recovery procedures
Viruses
Worms
A piece of code which can self-replicate and typically has a detrimental effect, e.g., corrupting the system or destroying data.
Trojans
A program that appears harmless, but is, in fact, malicious
Ransomware
A form of malware which encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment
Keyloggers
Software that obtains covert information about another computer’s activities by silently monitoring and recording their keystrokes.
Social engineering
How can sensitive data be protected?
Encryption
Access control
Physical security
Authentication
Backup and Recovery
Encryption
the process of converting data into an illegible, scarabled format so it cannot be understood by unauthorsised parties.
Access control
Users have different levels of access to systems (like read/write/delete permissions on file management)
Physical Security
Common measures include fire detection and suppression systems, CCTV, locks, biometrics, and ensuring that the hardware is in a safe location.