02 IS26317 - Lesson 6: Trust, Safety, and Reliability

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Hardware Errors

hardware might malfunction, causing erroneous results

2
New cards

Software Errors

mistakes in either the programming or the design of the software.

3
New cards

Mark II

an early known computer where the term bug supposedly go back to a moth that was found in 1947 in the computer’s circuitry.

4
New cards

Grace Hopper

who as a young naval lieutenant, was instrumental in implementing the programming language COBOL on the Mark I.

5
New cards

Misuse

involves attempting to use a computer for the wrong purpose or using one incorrectly for the right purpose.

6
New cards

Communication Failure

sometimes the person who is prompted for some action misunderstands what is being asked.

7
New cards

Malice

a form of vandalism, often the product of a full blown vendetta, for profit, crime, terrorism, or warfare.

8
New cards

Safety-critical software

software that may affect someone’s safety if it fails to work properly.

9
New cards

Decision Point

a place in computer code where the next instruction executed depends on input data.

10
New cards

Control Programs

programs that control some sort of machinery.

11
New cards

Real time

a program must do something within a specific amount of time.

12
New cards

Multiprocess

programs that execute at the same time as one or more other programs

13
New cards

Brooks’ Law

adding people to a late project makes it later.

14
New cards

Requirements

what is required of the software, for larger projects, specialist called “requirements engineers” interview clients to determine exactly what the system needs to do to best serve the clients

15
New cards

Specification and Design

once the requirements of a system are established, designers develop the particular set of component program modules or subprograms of the software system.

16
New cards

Implementation

programmers then use the design to create code in an appropriate programming language.

17
New cards

Douglas Birsch

applied ethicist who argues that both the programmer who designed Therac’s software and the company’s quality assurance officer bear significant moral responsibility for the accidents.

18
New cards

Malware

short for “malicious software”

19
New cards

Hackers

people who write and deploy malware.

20
New cards

Hacking

the activity of writing and deploying malware.

21
New cards

Worm

program that makes copies of itself and propagates those copies through a network to infect other computers.

22
New cards

Virus

similar to a worm, but resides in another program that must execute in order for the virus to propagate.

23
New cards

Spyware

program that is secretly installed for the purpose of collecting information about the computer’s user or users

24
New cards

Trojan Horse

software that masquerades as an innocent or useful program, but that is actually designed for a malicious purpose.

25
New cards

Rootkit

program that embeds itself into a computer’s operating system and acquires special privileges that would normally be available to the operating system.

26
New cards

White Hat Hackers

their goal is to seek out vulnerabilities so they can be removed before a malicious intruder discovers them and launches an attack

27
New cards

Tiger Team/ Red Team

the team involved in doing ethical hacking

28
New cards

Zero Attack/ Zero Day Attack

an attack that exploits a previously unidentified vulnerability

29
New cards

Phishing

most common way of exploiting human weaknesses, which attempts to fool or frighten a person into revealing key information.

30
New cards

Stuxnet

a computer worm that has significantly set back the Iranian nuclear development program

31
New cards

Darlington Nuclear Generating Stations

first Canadian nuclear station to use computers to run the emergency shutdown systems for its reactor.