Issues: Terms Flashcards
What are 4 environmental issues of electronics?
- Manufacture
- Energy Consumption
- Disposal/E-Waste and recycling
- Short replacement cycles
What is a Digital Footprint?
The trail of personal data you leave behind. E.g. GPS Data or data on device used
What are the principles of the Data Protection Act?
- Lawful reason for collecting data
- Purpose limited
- Data must be minimised
- Data must be accurate and current
- Data can’t be kept longer than necessary
- Data must be kept secure
- Organisations are accountable for failings
What is the Computer Misuse Act?
- Used to prosecute criminals (e.g. hackers) who gain unauthorised access.
- More severe punishments if there is an intention to do other crime. E.g. blackmail or identity theft
What is AI?
Computer systems that are capable of performing tasks that would normally involve human-like intelligence. E.g. Pattern recognition and decision making.
What is Machine Learning?
Algorithms that look for patterns and rules. Normally trained on large data sets.
What is Narrow AI?
Limited role or function. E.g. Checking e-mails for spam, voice recognition, lethal autonomous weapons, facial ad fingerprint ID
What is Algorithmic Bias?
AI that discriminates against certain individuals. Usually because: limited dataset / design flaw in programming / developer has their own biases that end up included.
What are 6 examples of Intellectual Property?
- Copyright
- Patents
- Trademarks
- Licensing
- Open source software
- Proprietary software
What is Copyright?
Law protects things such as drawings/novels/images and films. Automatic and lasts 70 years after death of holder
What are Patents?
- Protects new inventions
- Not automatic
- Lasts 20 years.
What are Trademarks?
Unique logos, straplines etc. Lasts 10 years and shown by R symbol
What is Licensing?
- A way of allowing other people to use your copyrighted work.
- Creative commons permits others to use your work and can have certain set conditions E.g. Non commercial use / Educational use only
What is Open Source Software?
- Software with a licence that allows anyone to modify or distribute the source code.
- Usually free but might have bugs or require specialist knowledge.
What is Proprietary Software?
- Software owned by an individual. Usually well tested but no access to source code.
- Often has a fee
Give 5 examples of Malware:
- Virus: Inserted into another program. Makes copies of itself
- Worms: Not embedded in other program but often hidden in background. Makes copies of itself
- Trojans: Pretends to be legit software and tricks people into downloading. Often provides a backdoor into a system
- Keyloggers: Secretly records each keystroke made by a user to record passwords etc.
- Botnet / DDOS: An army of zombie devices floods a system with access requests, causing it to crash
Give 5 examples of Social Engineering:
- Phishing: Fake emails pretending to be from the bank etc with link to ‘legit’ looking fake website
- Pretexting (blagging): Hacker pretends to be legit organisation and pretends there is an emergency
- Baiting: Victim offered free giveaway such as music download and this comes bundled with malware
- Quid pro quo: Victim provides login details and passwords in exchange for a ‘fake’ service. E.g. Enhanced virus protection.
- Shoulder-surfing: Hacker looks over shoulder of victim to see password. Can also use hidden cameras etc.
Name 6 Threats to systems:
- Malware
- Social Engineering
- Unpatched software: Zero day attacks are attacks on newly discovered vulnerabilities
- Out of date antimalware
- Open ports: Hackers scan for open ports (network access points)
- Default admin passwords: Devices like switches that have not had their default passwords changed
Give 5 ways to protect systems against threats:
- Firewall: Can be software or hardware. Blocks certain communications in and out of a network
- Anti-malware Software:
- Static Heuristic Analysis: Compares source code of scanned file to known malware
- Dynamic Heuristic Analysis: Isolates file and runs it inside a virtual machine to see what it does
- Encryption: Scramble data to keep it hidden and only a key can be used to access it.
- Symmetric encryption: Uses same key for encryption and decryption
- Asymmetric encryption: Uses public key for encryption and private key for decryption PGP
- Backup and recovery procedures:
- Full backup
- Incremental backup: Backup of changes. E.g. Only new files
- Acceptable Use Policy: Document that everyone in an organisation must sign. E.g. You can’t install programs