1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
E-waste
Discarded electronic equipment (computer technology, mobile devices, etc)
Carbon footprint
Carbon dioxide produced as a result of consuming energy
Personal data
Information that is personal and unique to an individual
Identity theft
Stealing someones personal details in order to commit fraud, or another crime
Data protection act 2018
Law that controls how organisations can use personal data they have gathered
Computer Misuse Act (1990)
It is illegal to make any unauthorised access to data:
with the intent to commit further offences
with the intent to modify data (e.g. viruses)
Copyright, Designs and Patents Act (1988)
Law that makes it illegal to copy or modify intellectual property without permission
Proprietary software
Software that is paid for, not open for modification
Open-source software
Software that is free, can be modified by users
Algorithmic bias
occurs when AI makes prejudiced decisions that discriminate against certain individuals
Artificial intelligence
Any machine programmed to think, work and react like humans
Machine Learning
Training devices or software to perform a task and improve its capabilities, through feeding it data.
Ethics
The principles of right and wrong that guide an individual in making decisions
Licensing
a legally binding contract that specifies how software can be used
Cybersecurity
Measures taken to protect a computer system against unauthorized access or attack
Cyber attack
An attempt by hackers to damage or destroy a computer network or system.
Malware
Software that is intended to damage or disable computer systems.
Cloud computing
A system in which all data is stored on a central server owned by a company (e.g. Google) and accessed virtually
Social engineering
Techniques that trick a person into disclosing confidential information
Worm
A software program capable of copying itself that can spread over a network, without the need for a host file (e.g. sending itself via email)
Virus
A piece of code that inserts itself in a host file, and then copies itself, corrupting the system or destroying data.
Trojan
A program that appears harmless but is malicious
Baiting
Persuading victims with something desirable, such as a free download, to trick them into downloading malware.
Ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Quid pro quo
Offering a service or benefit in exchange for sensitive information (e.g. promising IT assistance in return for login credentials.)
Replacement cycle
The period of time between the purchase of a product and its replacement with an equivalent product.
Data breach
The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
Data subject
The individual who’s data is being collected (such as the patient at a medical facility, a company employee or a retail store customer).
Intellectual property
A unique creation of the human mind, such as an invention or computer program
Trademark
Used by companies to distinguish goods and services from others and to protect their brand, lasts for 10 years
Spyware
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Phishing
When attackers trick individuals into revealing sensitive information by posing as trustworthy people
Pretexting
Attackers create a fake scenario to gain someone's trust and extract sensitive information (e.g. pretending to be a coworker to obtain company data)
Software patch
Designed to update a computer program in order to fix a software vulnerability or improve the program.
anti-malware software
detects, quarantines and removes malware from a computer
Backup and Recovery Plan
ensures critical data can be recovered if they are lost/corrupt. Backups can be automatic, scheduled, manual, incremental or full.
Acceptable Use Policy (AUP)
Helps to protect users by clearly stating what use of network resources are acceptable and what are not
Harmful materials from computer disposal
Dioxins
Mercury
Radioactive isotopes
Advantages of the replacement cycle
Up to date technology reduces chances of systems getting hacked
Replacing tech with more energy efficient devices can reduce costs with energy consumption
Disadvantages of the replacement cycle
Constant replacement can lead to increased waste as people throw away old technology.
Replacing technology can be expensive
Issues with the disposal of e-waste
E-waste may not be recycled but instead disposed of in landfill, which can be expensive and pollute the environment as they release toxic chemicals.
Issues with the collection and use of personal data
(POC MD)
Privacy (Who has access?)
Ownership (Who owns data about you?)
Consent (How is your data collected?)
Misuse (Hacking, phishing scams)
Data protection
Ways personal data is collected
Interaction with websites
Face recognition
GPS technology
Privacy and Electronic Communications Regulations 2003
Any website using cookies must:
tell users cookies are there
explain what the cookies are doing
obtain users consent to store cookies on their device
Robotics
Machines which carries out work following a set of programmed rules.
AI considerations
(ALAS)
Accountability
Legal Liability
Algorithmic bias
Safety
Copyright
A legal term used to describe the rights a creator has over their own work, lasts for 70 years after the death of the holder
Patents
An exclusive right granted for an invention. A patent prevents someone from copying an invention because it gives the inventor exclusive right to use it for 20 years.
Keylogger
Software that obtains info from another computer by silently recording their keystrokes
Information that companies must tell people when requesting consent to use their personal data (not the laws)
What the data is being collected for
How long it will be stored
That they are giving consent
Data protection legislation principles (that organisations must follow)
(LASAS)
Lawfulness
Accountability
Storage limitation (time kept)
Accuracy
Security
Ways data used to train an algorithm could cause algorithmic bias
(BIN)
Biased data
Inaccurate data
Not enough data
Data protection act laws for data collectors
Data you hold must be kept for no longer than necessary
Data you collect must be accurate and kept up to date
Data must be securely stored and prevent unauthorised access
Data protection act laws for data subjects
Subjects have a right for data to be processed appropriately
Subjects have the right to access data held about them to check and update it