social implications Flashcards

1
Q

what is acceptable user policy or AUP

A

set of rules drawn up by management of company to protect company, network, devices and data from misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are mobile offices

A

work at remore locations away from main offices by synchronising ICT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the aim of mobile offices

A

as few devices as possible so less must be transported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the disadvantages of mobiles offices

A

limitations of battery life and lack of power outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a virtual office

A

range of services offered by service prviders that gives appearance of that it physically exists onlince services are administered by service provider to interact with customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

why are virtual offices so useful

A

money can be saved
use of paper kept to minimum
documents shared using online storage resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is decentralistion of labour

A

employees have little need to perform jobs effectively in formal office environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the advantageof decentralistion of labour

A

transport and office space costs are reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the disadvantages of decentralisation of labour

A

loss in cohesion and common business purpose when emplouees don’t have regular contact with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what can robotics do

A

complex machines perform dangerous, repetitive and distasteful jobs which are boring and risky for human workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the advantages of robotics

A

reduces emplyee injuries caused by programming errors, mechanical failures and lack of worker vigilance
perform low-level tasks effectively
used in many indsutries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is Artificial intelligence

A

helping machines find solutions to complex problems in human-like manner uses algorithms to have abstract thought pattern recognition and reasoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are unmanned aerial vehicles (UAV)

A

type of aircraft that oeprates without human pilot on board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the advantages of UAV’s

A

reduces labours cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is social engineering

A

manipulating people into divulging confidential informatnion with intent to commit computer fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is shoulder surfing

A

attacker uses observational techninques to get informatnio whilst user inputs sensitive data close range or long range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is dupster diving

A

use dumped items to get informatnion about company empolyee and network structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is reverse social engineering

A

attacker convines target might have problem in future and ready to help solve it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is sabotage

A

corrupt system to appear to be corrupted after gaining access so that user looks for help to solve problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is marketing

A

attacker advertises himself as only person that can solve problem

21
Q

what is support

A

attacker gains trust of target and obtains access to senisitive information

22
Q

how is social media used for social engineering

A

hackers search for particular peron and create similar user with same details they must get the person to click on lint to install irus on target’s machine

23
Q

what is a hacker

A

experts who create and alternate computer code and enter systems undetected

24
Q

what are white hat hackers

A

non-malicious hackers test security of computer system by trying to break into it

25
what are black hat hackers
malicious hackers hack into system with intent to steal or vandalise
26
what are grey hat hackers
illegally break through system without authorisationto put vulnerabilitis on show and charge owner fee to repair it
27
what happens when hardware is stolen
software goes with it concern to security of computer/network
28
what is software theft
illegal copying,sharing or usage of copright protected programs
29
what is informatnion thefy
illefal copying or storage of confidential ,personal or financial informatnion
30
what is the thumb-sucking technique
informatnio nmoved to memory/USB drive, smartphone it is easy because flash drives are small and have large storage space
31
what is shraing data remotely
use remot access to transfer data to another location where it can be distributed
32
what are malware attack
capable of extracting sensitive informatnion
33
what is identity thefy
pretending to be someone else by essuming their identity to access resources
34
what is bandwidth theft
connect to internet via wireless router which don't have permission to use
35
what is theft of time
employee accepts payment for work not done/time they should've spent doing work related tasks
36
what is theft of services
intentionally use service without paying for that service
37
what are safeguards against computer crimes
``` anti-malware and firewall surf and download safely never click ok or agree to close pop window update software reqularly store sensitve data securely secure passwords stay alert to scams be cautious about personal informatnion ```
38
what is fake news
news,stories and hoaxes deliveratly created to misinform or deceive readers
39
what is clickbait
stories fabricated to gaiin more wevsite visitors and increase advertising income
40
what does propagande do
deliberaltely mislead readers, promote biased point of view,political cause or agency
41
what is satire
used to create face news for entertainment value
42
what is sloppy journalism
publish stories with unreliable informatnio without checking facts
43
what is affiliation
who supports websift and if company is affiliated to provessional organisation
44
what is an audience
who it's intened for and if content is appropriate for intended audince
45
what is authortiy
who is the author
46
what is content
content organised logically are links working and informatnion cited correctly
47
what is currency
is information up to data when was it update how up to date is it
48
what is design
easy to navigate visually plieasing view information properly webpage load easliy register and provide personal informatnio n
49
what is objectivity
does it reflect preconceptions mask for advertising how detailed is information does author use emotive language cite limited examples to support argument