Legislation. ICT in Engineering Flashcards

1
Q

What does ICT stand for?

A

I - Information

C - Communication

T - Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ICT?

A

ICT encompasses the technology for processing information.
-system
-network components
-communication devices
-software applications
-converting
-storing
-processing
-transmitting
-retrieving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why ICT in Engineering?

A

Engineers ensure the products and systems are fit for purpose (or meet specifications)

Engineers coordinate activities:
-simulation
-modelling
-prototyping
-manufacturing
-testing
-installation
-project management

In advance of manufacturing, engineers apply ICT to achieve goals such as:
-Eliminating flaws
-Reducing variation
-Minimising iterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Computer Crime?

A

It is a crime that involves computers and network
“The unlawful Acts whereby the Computer is either a tool or target or both”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who are computer criminals?

A

-Authorised employees
-Employees who were not authorised to use a computer system
-Outside users – Hackers and Crackers
-An Organisation’s competitors
-Others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Computer Crime:

A

-Theft of Hardware/Software
-Hacking
-Spamming
-Sniffing
-Denial of service attack
-Identity theft Fishing/Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is theft of hardware?

A

Act of stealing computer equipment:

Types:
-Opening computers and taking parts out of them
-Hardware theft also happens in retails stores, when people break, open the package and shoplift the item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Theft of software?

A

Unauthorised duplication and/or use of computer software

Types:
-Physically steal a media that contain the software
-Remove or disable the programs that have been written from the company computers (made by programmers)
-Software is stolen form the software manufactures, and later is duplicated for sale in black market (also known as piracy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Hacking?

A

-Any action that results in unauthorized interference with a computer, computer system or network
-Write or use ready-made programs to break into a computer

Types:
-To steal financial information such as credit cards to access to your funds
-To steal personal information
-To damage or modify data
-To launch computer attacks
-To gain access to other computers
-To transmit a virus via a malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Spamming?

A

Automated sending of large quantities of unsolicited e-mails to recipients.
This may be for marketing purposes
Can disrupt or disable networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Sniffing?

A

-Is the electronic eavesdropping on electronic data transmissions
-This may be of e-mails or of data which might be used for financial gain, for e.g., credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Denial of service attack?

A

An attempt to make a machine or network resource unavailable to its intended users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Identity theft?

A

The fraudulent acquisition and use of a person’s private identifying information, usually for financial gain

Two types:
-Skimming
-Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Identity Phishing?

A

Is a technique used by strangers to “fish” for information that you would not normally disclose such as bank account details credit card details Passport Number…
Email is very common method.
The site usually will look legit and real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Skimming?

A

Is the illegal copying of information from the magnetic strip of a credit or Automated Teller Machine (ATM) card using an electronic device known as Skimmer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer Misuse Act (CMA) (1990)

A

Made it illegal to (attempt to) make unauthorised access or changes to computer material.
Three sections:
1-Unauthorised access to computer material.
2-Unauthorised access with the intention to commit an offence (theft,…).
3-Unauthorised modification of computer material (virus, phishing, …)

17
Q

What is Privacy in legislation?

A

Privacy is the ability of an individual/group to stop data or information about themselves from becoming known to people other than those to whom they choose to give access

18
Q

The Data Protection Act (GDPR) -(2018)

A

Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.
Applies to all electronic data and all organisations must comply

19
Q

What is Intellectual property?

A

Intellectual property (IP) is intangible property created by an individual or organisation.
Is the product of human imagination, creativity, and inventiveness.

There are two types:
-Copyright
-Patent

20
Q

Copyright

A

Comes into effect automatically
So, copyright does not protect ideas, but only the expression of ideas.
Covers books, music, software, designs, …

21
Q

Patents

A

-More powerful than copyright
-Protects the idea behind an invention

22
Q

What do we mean by Ethics?

A

Doing the right thing according to standards set by society. Some behaviour may legal but still unethical

23
Q

Ethics at Brunel University

A

Any research that involves human participation, the collection or study of their data carried out at Brunel University requires ethical approval.
Advise on right of:
-Consent
-Withdrawal
-Confidentiality

24
Q

Morality is about

A

Defining what is right and wrong for an individual or a community

25
Q

It is important the participants in a research study feel sure that their data will not be used to identify them in any way. What ethical principle emphasises this?

A

Confidentiality

26
Q

Phishing is a kind of what?

A

Identity theft

27
Q

Which of the following can help us protecting our Intellectual Property?
a. Anti-virus software
b. Copyright
c. Patent
d. b and c

A

d. b and c

28
Q

Sending a computer virus via e-mail is considered as which of the following?
a. Law breaking
b. Unethical
c. Ethical
d. None of the above

A

a. Law breaking

29
Q

A more powerful means of protecting Intellectual Property is of

A

Patent

30
Q

Which of the following behaviours would most likely be described as unethical within UK society?
a. Terminating a mobile phone contract early in response to an unexpected and unreasonable tariff increase
b. A salesman accessing her neighbour’s rental history to gain conversation ideas
c. Writing down your credit card PIN number so that you don’t forget it
d. Breaking the speed limit whilst driving an critically ill person to hospital

A

A salesman accessing her neighbour’s rental history to gain conversation ideas

31
Q

Sending of large quantities of unsolicited e-mails to recipients is known as:

A

Spamming

32
Q

Computer criminals are:
a. Hackers
b. Crackers
c. Authorised Employees
d. All of the above

A

d. All of the above

33
Q

Sniffing is a kind of what?

A

Electronic spying or eavesdropping

34
Q

Which of the following is not a type of copyright work?
a. Literary works
b. Sculpture
c. Furniture
d. Musical works

A

c. Furniture

35
Q

Which of the following statements is true about patents?
a. Provides automatic protection of any intellectual property
b. Protects both the idea and any instantiation of that idea
c. Is a confidential document that is only published after a set period of time
d. Is commonly used to protect computer software

A

b. Protects both the idea and any instantiation of that idea

36
Q

Breaking into a computer system without the permission of the owner is called what?

A

Hacking

37
Q

Steve works for a library. He wants to ask his neighbour on a date, so has a quick look on the system at her rental history to gain conversational ideas. This kind of behaviour is close to be of:
a. illegal
b. legal
c. unethical
d. ethical

A

c. unethical

38
Q

UK developer normally have to protect their software products through?

A

Copyright