Issues: Terms Flashcards

1
Q

What are 4 environmental issues of electronics?

A
  • Manufacture
  • Energy Consumption
  • Disposal/E-Waste and recycling
  • Short replacement cycles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Digital Footprint?

A

The trail of personal data you leave behind. E.g. GPS Data or data on device used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the principles of the Data Protection Act?

A
  • Lawful reason for collecting data
  • Purpose limited
  • Data must be minimised
  • Data must be accurate and current
  • Data can’t be kept longer than necessary
  • Data must be kept secure
  • Organisations are accountable for failings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Computer Misuse Act?

A
  • Used to prosecute criminals (e.g. hackers) who gain unauthorised access.
  • More severe punishments if there is an intention to do other crime. E.g. blackmail or identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AI?

A

Computer systems that are capable of performing tasks that would normally involve human-like intelligence. E.g. Pattern recognition and decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Machine Learning?

A

Algorithms that look for patterns and rules. Normally trained on large data sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Narrow AI?

A

Limited role or function. E.g. Checking e-mails for spam, voice recognition, lethal autonomous weapons, facial ad fingerprint ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Algorithmic Bias?

A

AI that discriminates against certain individuals. Usually because: limited dataset / design flaw in programming / developer has their own biases that end up included.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 6 examples of Intellectual Property?

A
  • Copyright
  • Patents
  • Trademarks
  • Licensing
  • Open source software
  • Proprietary software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Copyright?

A

Law protects things such as drawings/novels/images and films. Automatic and lasts 70 years after death of holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Patents?

A
  • Protects new inventions
  • Not automatic
  • Lasts 20 years.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Trademarks?

A

Unique logos, straplines etc. Lasts 10 years and shown by R symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Licensing?

A
  • A way of allowing other people to use your copyrighted work.
  • Creative commons permits others to use your work and can have certain set conditions E.g. Non commercial use / Educational use only
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Open Source Software?

A
  • Software with a licence that allows anyone to modify or distribute the source code.
  • Usually free but might have bugs or require specialist knowledge.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Proprietary Software?

A
  • Software owned by an individual. Usually well tested but no access to source code.
  • Often has a fee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give 5 examples of Malware:

A
  • Virus: Inserted into another program. Makes copies of itself
  • Worms: Not embedded in other program but often hidden in background. Makes copies of itself
  • Trojans: Pretends to be legit software and tricks people into downloading. Often provides a backdoor into a system
  • Keyloggers: Secretly records each keystroke made by a user to record passwords etc.
  • Botnet / DDOS: An army of zombie devices floods a system with access requests, causing it to crash
16
Q

Give 5 examples of Social Engineering:

A
  • Phishing: Fake emails pretending to be from the bank etc with link to ‘legit’ looking fake website
  • Pretexting (blagging): Hacker pretends to be legit organisation and pretends there is an emergency
  • Baiting: Victim offered free giveaway such as music download and this comes bundled with malware
  • Quid pro quo: Victim provides login details and passwords in exchange for a ‘fake’ service. E.g. Enhanced virus protection.
  • Shoulder-surfing: Hacker looks over shoulder of victim to see password. Can also use hidden cameras etc.
17
Q

Name 6 Threats to systems:

A
  • Malware
  • Social Engineering
  • Unpatched software: Zero day attacks are attacks on newly discovered vulnerabilities
  • Out of date antimalware
  • Open ports: Hackers scan for open ports (network access points)
  • Default admin passwords: Devices like switches that have not had their default passwords changed
18
Q

Give 5 ways to protect systems against threats:

A
  • Firewall: Can be software or hardware. Blocks certain communications in and out of a network
  • Anti-malware Software:
    • Static Heuristic Analysis: Compares source code of scanned file to known malware
    • Dynamic Heuristic Analysis: Isolates file and runs it inside a virtual machine to see what it does
  • Encryption: Scramble data to keep it hidden and only a key can be used to access it.
    • Symmetric encryption: Uses same key for encryption and decryption
    • Asymmetric encryption: Uses public key for encryption and private key for decryption PGP
  • Backup and recovery procedures:
    • Full backup
    • Incremental backup: Backup of changes. E.g. Only new files
  • Acceptable Use Policy: Document that everyone in an organisation must sign. E.g. You can’t install programs