social implications Flashcards

1
Q

what is acceptable user policy or AUP

A

set of rules drawn up by management of company to protect company, network, devices and data from misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are mobile offices

A

work at remore locations away from main offices by synchronising ICT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the aim of mobile offices

A

as few devices as possible so less must be transported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the disadvantages of mobiles offices

A

limitations of battery life and lack of power outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a virtual office

A

range of services offered by service prviders that gives appearance of that it physically exists onlince services are administered by service provider to interact with customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

why are virtual offices so useful

A

money can be saved
use of paper kept to minimum
documents shared using online storage resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is decentralistion of labour

A

employees have little need to perform jobs effectively in formal office environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the advantageof decentralistion of labour

A

transport and office space costs are reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the disadvantages of decentralisation of labour

A

loss in cohesion and common business purpose when emplouees don’t have regular contact with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what can robotics do

A

complex machines perform dangerous, repetitive and distasteful jobs which are boring and risky for human workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the advantages of robotics

A

reduces emplyee injuries caused by programming errors, mechanical failures and lack of worker vigilance
perform low-level tasks effectively
used in many indsutries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is Artificial intelligence

A

helping machines find solutions to complex problems in human-like manner uses algorithms to have abstract thought pattern recognition and reasoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are unmanned aerial vehicles (UAV)

A

type of aircraft that oeprates without human pilot on board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the advantages of UAV’s

A

reduces labours cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is social engineering

A

manipulating people into divulging confidential informatnion with intent to commit computer fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is shoulder surfing

A

attacker uses observational techninques to get informatnio whilst user inputs sensitive data close range or long range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is dupster diving

A

use dumped items to get informatnion about company empolyee and network structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is reverse social engineering

A

attacker convines target might have problem in future and ready to help solve it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is sabotage

A

corrupt system to appear to be corrupted after gaining access so that user looks for help to solve problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is marketing

A

attacker advertises himself as only person that can solve problem

21
Q

what is support

A

attacker gains trust of target and obtains access to senisitive information

22
Q

how is social media used for social engineering

A

hackers search for particular peron and create similar user with same details they must get the person to click on lint to install irus on target’s machine

23
Q

what is a hacker

A

experts who create and alternate computer code and enter systems undetected

24
Q

what are white hat hackers

A

non-malicious hackers test security of computer system by trying to break into it

25
Q

what are black hat hackers

A

malicious hackers hack into system with intent to steal or vandalise

26
Q

what are grey hat hackers

A

illegally break through system without authorisationto put vulnerabilitis on show and charge owner fee to repair it

27
Q

what happens when hardware is stolen

A

software goes with it concern to security of computer/network

28
Q

what is software theft

A

illegal copying,sharing or usage of copright protected programs

29
Q

what is informatnion thefy

A

illefal copying or storage of confidential ,personal or financial informatnion

30
Q

what is the thumb-sucking technique

A

informatnio nmoved to memory/USB drive, smartphone it is easy because flash drives are small and have large storage space

31
Q

what is shraing data remotely

A

use remot access to transfer data to another location where it can be distributed

32
Q

what are malware attack

A

capable of extracting sensitive informatnion

33
Q

what is identity thefy

A

pretending to be someone else by essuming their identity to access resources

34
Q

what is bandwidth theft

A

connect to internet via wireless router which don’t have permission to use

35
Q

what is theft of time

A

employee accepts payment for work not done/time they should’ve spent doing work related tasks

36
Q

what is theft of services

A

intentionally use service without paying for that service

37
Q

what are safeguards against computer crimes

A
anti-malware and firewall 
surf and download safely 
never click ok or agree to close pop window 
update software reqularly 
store sensitve data securely 
secure passwords 
stay alert to scams 
be cautious about personal informatnion
38
Q

what is fake news

A

news,stories and hoaxes deliveratly created to misinform or deceive readers

39
Q

what is clickbait

A

stories fabricated to gaiin more wevsite visitors and increase advertising income

40
Q

what does propagande do

A

deliberaltely mislead readers, promote biased point of view,political cause or agency

41
Q

what is satire

A

used to create face news for entertainment value

42
Q

what is sloppy journalism

A

publish stories with unreliable informatnio without checking facts

43
Q

what is affiliation

A

who supports websift and if company is affiliated to provessional organisation

44
Q

what is an audience

A

who it’s intened for and if content is appropriate for intended audince

45
Q

what is authortiy

A

who is the author

46
Q

what is content

A

content organised logically are links working and informatnion cited correctly

47
Q

what is currency

A

is information up to data when was it update how up to date is it

48
Q

what is design

A

easy to navigate visually plieasing view information properly webpage load easliy register and provide personal informatnio n

49
Q

what is objectivity

A

does it reflect preconceptions mask for advertising how detailed is information does author use emotive language cite limited examples to support argument