mod 1.6 :the dark side of computing Flashcards

1
Q

what are errors and failures of computer systems caused by

A
  1. Bad programming
  2. poor Training
  3. Poor procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

errors and failures usually leads to inaccurate information. This leaves a devastating effect on?

A

trust, decision making, product quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what causes a breakdown in user’s trust ?

A

if a computer system repeatedly produces errors, then the users of the system will begin to lose their trust in the system causing many consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the consequences of of the breakdown in the user’s trust

A
  • decrease in efficiency- repeated failures leads to delay as people put off doing their work or they need to redo their work because the system failed
  • reduced morale or motivation- people begin to feel that the ‘computer’ is going to mess up their work anyway , so why bother to work hard, efficiently and accurately?
  • Increased workload- people start to create
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the main reason for a computer systems

A

to process large amounts of data into information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what happens if people do not trust the information

A

people can and will delay making decision , which can cost money or lives.
Inaccurate information can also easily lead to the wrong decision being made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why is that there is no guarantee that any given piece of information you are presented with is correct

A

people who use information need to learn vital skills for analysing,interpreting and judging the quality of information. The information age creates the freedom for anyone to publish anything with ease therefore people can use information as a criminal tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how one can protect their data

A

+ controlling access to physical data
+ control access to computers
+ limiting and restricting use f portable storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protecting data by controlling access to physical data

A

it does not help even with the most secure computer system and and digital data in the world - if someone can just walk into ur office and help themselves to paper records and backup media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

protecting data by controlling access to computers

A
  1. keep computers with valuable information in looked rooms and control access to the room
  2. make sure that the computer requires a login when starting and waking from screensaver mode
  3. make sure that the computer does not have unrestricted access to the internet
  4. also ensure that not just any device can make a bluetooth connection to your device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

protecting data by limiting and restricting use of portable storage

A

control what portable storage people get to use on your computers. it does not matter what encryption you have if someone can copy your documents and take it away to another place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is social engineering

A

is manipulating people to get access to their 4,data or their physical computers or premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the goal of social engineering

A

the use of basic human emotions and failings such as fear or greed or optimism to get access to either ur secrets, your data or your physica computers or premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

example of social engineerings tricks in phishing, emails and scams

A
  • tellingu that u have won the lottery
  • offering you a business opportunity
  • telling u there is a problem with your online banking details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the best protection against social engineering

A

+ remember ‘ if it sounds too good to be true, then it probably is’
+ know the people u work with and don’t trust strangers around data
+ THINK before u act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is considered as “ computer misuse”

A

it is where a physical computer resources are used whether without permission or for tasks not authorised by the owner of the computer

17
Q

what are the results of invasion of privacy

A
  • Loss of productivity
  • identity theft
  • Reality distortion through personalisation filters
18
Q

what are the social consequences of malware

A
  • financial cost
  • Lost productivity
  • Personal implications
19
Q

social consequences of malware on Finacial Cost

A

the cost of purchasing new software to prevent infections is much greater for organisations and companies which have to protect hundreds of computers.They also have to protect servers and web sites as well as pay for the services of the experts to help them in the battle against malware.The cost is the passed on to the consumer when he/she buys the products from the companies

20
Q

social consequences of malware on Lost productivity

A

when computers are infected with malware anything from several hours to several days worth of time can be spent trying to remove the infection and fix the problem .All of this time should be spent of productive week. A single malware infection in a huge company might results in millions of rands lost of productivity

21
Q

social consequences of malware on Personal Implications

A
  • People have to be less trusting of others- they have to assume that bank messages are fake and false pleas of help
  • They have to deal with the financial consequences of possibly losing their savings and investments because of computer fraud
  • their time is wasted in different ways like