Legislation. ICT in Engineering Flashcards
What does ICT stand for?
I - Information
C - Communication
T - Technology
What is ICT?
ICT encompasses the technology for processing information.
-system
-network components
-communication devices
-software applications
-converting
-storing
-processing
-transmitting
-retrieving
Why ICT in Engineering?
Engineers ensure the products and systems are fit for purpose (or meet specifications)
Engineers coordinate activities:
-simulation
-modelling
-prototyping
-manufacturing
-testing
-installation
-project management
In advance of manufacturing, engineers apply ICT to achieve goals such as:
-Eliminating flaws
-Reducing variation
-Minimising iterations
What is Computer Crime?
It is a crime that involves computers and network
“The unlawful Acts whereby the Computer is either a tool or target or both”
Who are computer criminals?
-Authorised employees
-Employees who were not authorised to use a computer system
-Outside users – Hackers and Crackers
-An Organisation’s competitors
-Others
Types of Computer Crime:
-Theft of Hardware/Software
-Hacking
-Spamming
-Sniffing
-Denial of service attack
-Identity theft Fishing/Skimming
What is theft of hardware?
Act of stealing computer equipment:
Types:
-Opening computers and taking parts out of them
-Hardware theft also happens in retails stores, when people break, open the package and shoplift the item
What is Theft of software?
Unauthorised duplication and/or use of computer software
Types:
-Physically steal a media that contain the software
-Remove or disable the programs that have been written from the company computers (made by programmers)
-Software is stolen form the software manufactures, and later is duplicated for sale in black market (also known as piracy)
What is Hacking?
-Any action that results in unauthorized interference with a computer, computer system or network
-Write or use ready-made programs to break into a computer
Types:
-To steal financial information such as credit cards to access to your funds
-To steal personal information
-To damage or modify data
-To launch computer attacks
-To gain access to other computers
-To transmit a virus via a malicious software
What is Spamming?
Automated sending of large quantities of unsolicited e-mails to recipients.
This may be for marketing purposes
Can disrupt or disable networks
What is Sniffing?
-Is the electronic eavesdropping on electronic data transmissions
-This may be of e-mails or of data which might be used for financial gain, for e.g., credit card details
What is Denial of service attack?
An attempt to make a machine or network resource unavailable to its intended users
What is Identity theft?
The fraudulent acquisition and use of a person’s private identifying information, usually for financial gain
Two types:
-Skimming
-Phishing
What is Identity Phishing?
Is a technique used by strangers to “fish” for information that you would not normally disclose such as bank account details credit card details Passport Number…
Email is very common method.
The site usually will look legit and real.
What is Skimming?
Is the illegal copying of information from the magnetic strip of a credit or Automated Teller Machine (ATM) card using an electronic device known as Skimmer.
Computer Misuse Act (CMA) (1990)
Made it illegal to (attempt to) make unauthorised access or changes to computer material.
Three sections:
1-Unauthorised access to computer material.
2-Unauthorised access with the intention to commit an offence (theft,…).
3-Unauthorised modification of computer material (virus, phishing, …)
What is Privacy in legislation?
Privacy is the ability of an individual/group to stop data or information about themselves from becoming known to people other than those to whom they choose to give access
The Data Protection Act (GDPR) -(2018)
Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.
Applies to all electronic data and all organisations must comply
What is Intellectual property?
Intellectual property (IP) is intangible property created by an individual or organisation.
Is the product of human imagination, creativity, and inventiveness.
There are two types:
-Copyright
-Patent
Copyright
Comes into effect automatically
So, copyright does not protect ideas, but only the expression of ideas.
Covers books, music, software, designs, …
Patents
-More powerful than copyright
-Protects the idea behind an invention
What do we mean by Ethics?
Doing the right thing according to standards set by society. Some behaviour may legal but still unethical
Ethics at Brunel University
Any research that involves human participation, the collection or study of their data carried out at Brunel University requires ethical approval.
Advise on right of:
-Consent
-Withdrawal
-Confidentiality
Morality is about
Defining what is right and wrong for an individual or a community
It is important the participants in a research study feel sure that their data will not be used to identify them in any way. What ethical principle emphasises this?
Confidentiality
Phishing is a kind of what?
Identity theft
Which of the following can help us protecting our Intellectual Property?
a. Anti-virus software
b. Copyright
c. Patent
d. b and c
d. b and c
Sending a computer virus via e-mail is considered as which of the following?
a. Law breaking
b. Unethical
c. Ethical
d. None of the above
a. Law breaking
A more powerful means of protecting Intellectual Property is of
Patent
Which of the following behaviours would most likely be described as unethical within UK society?
a. Terminating a mobile phone contract early in response to an unexpected and unreasonable tariff increase
b. A salesman accessing her neighbour’s rental history to gain conversation ideas
c. Writing down your credit card PIN number so that you don’t forget it
d. Breaking the speed limit whilst driving an critically ill person to hospital
A salesman accessing her neighbour’s rental history to gain conversation ideas
Sending of large quantities of unsolicited e-mails to recipients is known as:
Spamming
Computer criminals are:
a. Hackers
b. Crackers
c. Authorised Employees
d. All of the above
d. All of the above
Sniffing is a kind of what?
Electronic spying or eavesdropping
Which of the following is not a type of copyright work?
a. Literary works
b. Sculpture
c. Furniture
d. Musical works
c. Furniture
Which of the following statements is true about patents?
a. Provides automatic protection of any intellectual property
b. Protects both the idea and any instantiation of that idea
c. Is a confidential document that is only published after a set period of time
d. Is commonly used to protect computer software
b. Protects both the idea and any instantiation of that idea
Breaking into a computer system without the permission of the owner is called what?
Hacking
Steve works for a library. He wants to ask his neighbour on a date, so has a quick look on the system at her rental history to gain conversational ideas. This kind of behaviour is close to be of:
a. illegal
b. legal
c. unethical
d. ethical
c. unethical
UK developer normally have to protect their software products through?
Copyright