SOCIAL AND ECONOMIC IMPACT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

flashcard set

Earn XP

Description and Tags

Section 3

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

What is computer security?

Computer security is the set of activites involving the identifying, assessing and managing of vulnerabilities,threats and attacks on a computer systems and data.

2
New cards

What is computer misuse?

Computer misuse is any activity in which the computer or its data is accessed, modified or deleted without authorization

3
New cards

What is cybersecurity?

Computer security is the set of activites involving the identifying, assessing and managing of vulnerabilities, threats, and attacks originating from cyberspace

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

4
New cards

State ONE similarity and ONE difference between Computer Security and Cybersecurity

Similarity: Both focus on protecting information and systems.

Difference: Computer security is more inward-looking and focuses on protecting local computer systems under your control, while cybersecurity is outwards and addresses threats from the internet / network connected computers

5
New cards

What are the FOUR main elements of computer security?

Vulnerability, Threat, Attack, Countermeasure

6
New cards

TRUE or FALSE: A firewall can be both a hardware and software component

TRUE

7
New cards

What is the purpose of a firewall?

Firewalls monitor a network, blocking dangerous content such as viruses

8
New cards

What does the term ‘vulnerability’ mean?

The exposure to the possibility of being attacked or harmed.

9
New cards

Define the term ‘threat’

A statement of intention to inflict harm/damage

10
New cards

What term is defined as the ‘actual action that causes harm or damage’?

Attack

11
New cards

What is a ‘countermeasure’?

An action taken to counteract a threat

12
New cards

What sort of countermeasures might you put in place to prevent physical access to a computer room?

  • Security Personnel

  • Biometric System

  • Access Control Systems

  • Padlock

  • CCTV Monitoring

  • Facial Recognition

  • ‘Man traps’ - one door must be closed before the next opens.

13
New cards

State at least TWO ways an individual can misuse a computer

  • Identity Theft

  • Cyberbullying

  • Phishing Attacks

  • Violation of Privacy

14
New cards

What is a phishing attack?

A type of cyber attack that involves tricking individuals into providing sensitive information, such as usernames, passwords, or credit card details, often through deceptive emails or websites.

15
New cards

Define the term ‘software piracy’

The unauthorized copying, distribution, or use of software, violating copyright laws and licensing agreements.

Software piracy refers to the illegal reproduction and distribution of software, typically to avoid purchasing legitimate copies.

16
New cards

What is ‘industrial espionage’?

The unauthorised access to confidential information or trade secrets of a business for competitive advantage, often involving theft or deceit.

17
New cards

Explain a DOS attack

A Denial of Service (DOS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic or sending it malformed requests, rendering it inaccessible to legitimate users.

18
New cards

Define ‘electronic eavesdropping’

The act of secretly listening to private conversations or intercepting electronic communications without the consent of the parties involved.

19
New cards

Suggest how electronic eavesdropping would be useful to law enforcement

It allows law enforcement to gather evidence and monitor criminal activities by intercepting communications, which can provide critical information for investigations and intelligence.

20
New cards

What is ‘propoganda’ in simple terms?

The spreading of false or misleading information to influence public opinion or promote a particular agenda.

21
New cards

What is ‘espionage’?

The practice of spying or of using spies, typically by governments to obtain political and military information.

22
New cards

List 5 common computer systems may be misused by individuals:

  1. Cyberbullying

  2. Online Publication of Obscene materials

  3. Phishing Attacks

  4. Violation of Privacy

  5. Credit Card Fraud

  6. Identity Theft

23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards

What is ‘cyberbullying’?

A form of bullying/harassment done using an online space. It involves the sending, posting or sharing of negative, harmful, false or mean content about someone else to cause embarrassment/humiliation.

32
New cards

Suggest THREE possible platforms where cyberbullying can take place

  • Gaming Platforms

  • Short Messaging Service (SMS)

  • Social Media Sites

33
New cards

Suggest three features of a phishing email that may cause the recipient to become suspicious

  1. An urgent response is demanded

  2. Grammar errors

  3. Suspicious sender address

34
New cards

What is a ‘cookie’?

A piece of data sent from a website to a user’s computer and is stored by the user’s web browser while the user is browsing.

35
New cards

What is ‘malware’?

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

36
New cards

State 2 ways malware may gain entry to a computer system

  1. Physically to a system through a USB drive or other external storage device

  2. The Internet - visiting unsafe websites

  3. Phishing attacks - downloading infected email attachments

37
New cards

What is a trojan?

A type of malware included with a legitimate program and activated following installation. Trojans steal usernames and passwords

38
New cards

Differentiate between how a worm and a virus operates

A worm is a standalone malware that replicates itself to spread across networks, often without user action, while a virus attaches itself to legitimate files and requires user interaction to be activated and propagate.

39
New cards

List 3 physical security measures to mitigate threats on a computer system

  1. Secure location

  2. Security personnel

  3. Electronic Access systems

  4. Equipment Locks

  5. Fireproof and waterproof storage

40
New cards

List 3 software security measures to mitigate threats on a computer system

  1. Antivirus software

  2. Firewalls

  3. Intrusion Detection Systems

  4. Operating System updates

  5. Encryption

41
New cards

List 3 personal security practices to mitigate threats on a computer system

  1. Strong passwords

  2. Make regular backups

  3. Dont join open WiFi networks

  4. Keep track of where your mobile devices are

  5. Use two-factor authentication

  6. Regularly update software

  7. Monitor accounts for suspicious activity

  8. Awareness of phishing scams

42
New cards

State how automation can impact jobs negatively (job loss)

Automation can lead to job displacement as machines and software can perform tasks traditionally done by humans, resulting in reduced employment opportunities and potential skill mismatches in the workforce.

43
New cards

Describe ONE negative impact that information Technology has had on a medical professional

Staff has to be retrained to use new technology programs, which can take time away from patient care and potentially lead to errors during the transition.

44
New cards

State the role of a Network Engineer

Responsible for the design and implementation of computer networks : LANs, MANs and WANs

45
New cards

What is the role of a computer programmer?

Computer programmers write software based on specifications, provide documentation and maintain software

46
New cards

What network professional Oversees activities related to the design and development of new information systems.

Systems Analyst.

47
New cards

What does a Computer Support Specialist do?

Assists users with technical issues, maintains computer systems, and provides support for hardware and software problems.

48
New cards

State the role of a Network Administrator

Responsible for the day-to-day smooth running of an organization’s network

49
New cards

Who is a system administrator?

A system administrator is a computer professional who is responsible for the day-to-day running and management of computer systems. They install and update software and ensure the system is secure.

50
New cards

What is the role of a database administrator?

Responsible for designing and maintaining an organisation's databases.

51
New cards

What does a software developer do?

A software developer develops the program specifications that programmers work from

52
New cards

Who is a web developer?

A professional who takes a web design from a client and turns it into an operational website.

53
New cards

What does a social media specialist do?

Responsible for planning and implementing a company’s social media strategy and output.

54
New cards

List three ways in which computers are being used in the classroom today

Computers are used for interactive learning, to access educational resources online, and for collaborative projects among students.

55
New cards

When computers are used as teaching aids, it is knows as?

Computer Aided Instruction (CAI) or Computer Aided Learning (CAL)

56
New cards

How are computers used for commerce?

Computers in commerce enable online shopping, streamline supply chain management, and facilitate electronic payment systems (EPOS = Electronic point of sale), stock-keeping

57
New cards

What is telemedicine?

Telemedicine refers to the use of telecommunications technology to provide medical care and consultation remotely. It allows healthcare professionals to diagnose and treat patients from a distance, improving access to medical services.

58
New cards

Briefly discuss Information Technology’s effect on Recreation

Gaming - networking and digital music production.

Film - online streaming services and film distribution.

Social media - access to communities and sharing of experiences.

Music - MIDI systems, online streaming platforms