professional practices- exam 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

Hacking

intentional, unauthorized access to computer system

2
New cards

Hacking - Phase 1

-Hacking was positive

The joy of programming, “hacker” was a creative programmer who wrote clever/elegant code

a “hack was an especially clever piece of code

3
New cards

Hacking: Phase 2

Hacking began taking a negative connotation

-Hackers broke into computers they did not have authorized access to

-still primarily individuals

-included spreading computer viruses

-companies began using hackers to analyze/improve security

4
New cards

Hacking- Phase 3

-viruses could spread rapidly

-political hacking (Hacktivism) began

-denial of series (DoS) attacks shut down websites

-large scale theft of personal/financial info

5
New cards

Harmless hacking- harmless?

responding to nonmalicous or prank hacking uses resources

and hacker could accidentally do serious damage

-almost all forms of hacking is a form of trespass

6
New cards

Hacktivism/political hacking

-Use of hacking to promote political cause

-shutting out opposition leads to first amendment infringement

7
New cards

White hat hacker

uses skills to demonstrate system vulnerabilities to improve security

8
New cards

Black Hat hackers

use their skills to perpetrate harm

9
New cards

Grey hat hackers

use their skills to find vulnerabilities, but publish their findings before informing the owners of the system

10
New cards

Hacking as foreign policy

Hacking by governments has increased

Pentagon will treat some cyber attacks as act of war w/ military force

11
New cards

Stuxnet

Extremely sophisticated worm that targets particular type of control system

-in 2008, it damaged equipment in an uranium enrichment plant in Iran

12
New cards

Hacking is a problem, but so is poor security:

What contributes to security weakness:

-web history

-inherent complexity of system

-application development speed

-economic/business factors

-human nature

13
New cards

firewalls

used to monitor/filter out communications from untrusted sites/sus activity

14
New cards

Security is often playing catch up to….

hackers, as new vulnerabilities are discovere, then exploited

15
New cards

Responsibilities for security

Developers must develop with security in mind

businesses must use security tools to monitor their systems

home users have a responsibility to ask questions/educate themselves on tools to maintain security (like personal firewall, anti-virus, anti spyware)

16
New cards

CFAA- Computer Fraud and Abuse act

  • covers government,finacial and medical systems, and activities that involve computers in more than one state

  • under cfaa , its illegal to access a computer without authorization

17
New cards

USA Patriot act

expanded the computer fraud and abuse act to the definition of loss including cost of response to an attack/restoring systems

18
New cards

To Catch hackers

law enforcmenet read hacker newsletters, and participate in chatrooms undercover

19
New cards

Honey pots

security professionals set up honey pots, which are websites that attract hackers, to record and study

20
New cards

Computer forensic specialists….

can retiree evidence from computers even if files have been deleted and erased off disk

21
New cards

Penalities of Hackers

Lots of young hackers go on to do more productive things (probation, fines)

sentencing depends on intent and damage done

22
New cards

expansion of cfaa

-cfaa predates social networks and smart phones

23
New cards

Fazio Mechanical

phishing email sent to fazio, data on 40 mill credit cards stolen, 70 mill customer records stolen

24
New cards

Small businesses on hacking

cant afford security, and are gateways to larger systems

-usually go out of business after breach

25
New cards

Security breaches occur:

poor written software

poor configured networks and applications 

26
New cards

for security researchers and cyber security professionals

whistleblowing vs responsible disclosure

27
New cards

identity theft

various crimes in which criminals use the identity of an unknowing, innocent person

18-29 common victims

28
New cards

smishing

text messages phishing

29
New cards

vishing

voice phishing

30
New cards

biometrics

biological characteristics unique to an individual

more difficult to be fooled

31
New cards

digital actions across borders

corporations that do business in other/multiple countries must comply with all laws from every country

-someone who’s actions are legal in their country, may face prosecution in another country where that same thing is illegal

32
New cards

yahoo and French censorship

nazi is illegal in France and germany

yahoo was sued in French court because French citizens could view nazi memorabilia 

33
New cards

unlawful internet gambling enforcement act

prohibits credit card/online payment being bettors and gambling sites

someone from Britain did this where it was legal but on a plane in Dallas he got arrested

34
New cards

libel tourism

traveling to places with strict libel laws to sue them

35
New cards

speech act of 2010

makes foreign libel judgement unenforceable in the us, if doing so would also violate the first amendment

36
New cards

respecting cultural differences is not the same as respecting laws

-countries apart of the world trade org agree that if something is legal in your own country and another one, you should be able to buy that same thing in the other country

-however if its legal in a but not in b ( or vice versa) then you cant

37
New cards
38
New cards

Responsibility to prevent access

publishers must prevent material or services form being accessed in countries where they are illegal

39
New cards

authority to prevent entry

government of country a can act within country a to block illegal material

country a cant apply the laws to people in country b if its legal there

40
New cards

Introduction to computes in the workplace brought fear

mass unemployment due to increased efficiency

need for increased skills widens earning gap

employers use tech to monitor workers

offshoring of jobs = mass unemployment

41
New cards

job creation and destruction

successful technology eliminates/reduces some jobs but creates others

lower prices crearte demand and jobs 

42
New cards

impact of computers and employment

growth of computers is steady, unemployment fluctuates

unemployment has more to do with economy ability to adapt to change

43
New cards

are we earning less?

wages decreased but fringe benefits increased

people work fewer hours post Industrial Revolution

44
New cards

Purchasing power increases as

prices fall

45
New cards

decrease in take home pay due to

increased taxes, etc other factors not only computers!

46
New cards

changing skills and levels

-new products and services based on tech create jobs in design, marketing, manufactures, sales, computer service, repair, and maintence

47
New cards

the new jobs created by computers

are different from the jobs eliminated

ex- new jobs like cse software engineer require a degree

bank tellers or customer services dont

48
New cards

companies are more willing to hire people without specific skills because…

they can train new people quickly and use automated support systems

49
New cards

Telecommuting

Working at home using a computer linked to the persons place of unemployment

50
New cards

telecomuting pros

reduces employers ovehead

reduces large office needs

employees more satisfied loyal and productive

reduces traffic, pollution, stress, and gas use

reduces commuting expenses

allows work to continue after blizzards or hurricanes

51
New cards

telecommuting cons

employers see resentment from the people who cant telecommute

corporation loyalty can weaken

odd work hours

cost of office space shifted to the employee

security risks when work and personal stuff are on same computer

52
New cards

Outsourcing

company pays another company for services instead of doing it themselves

53
New cards

offshoring

moving business services to another country to reduce costs

54
New cards

inshoring

when offshoring happens (ex - German moves business to America) insphoring is the process of this german company hiring a bunch of americans

when a country employs thousands of people from another country (5 percent of Americans employed by foreign work)

55
New cards

cons of offshoring

customers cant understand the new accents

employees need new skills to match the different country

increased demand in high skill workers force higher salaries

56
New cards

employee monitoring

roughly have of major companies in the us monitor their employees (most infrequently, some routinely)

time clocks and logs

started in blue colar (factory) and pink color (telephone, clerical) hobs

posses patrolled aisles to watch workers

outputs counts at the end of the day

57
New cards

separating work and home communications

-jobs tend to ban employees for using work emails for personal use

-sometimes employees use personal emails for work

58
New cards

monitoring at work occurs because

  • training/productivity

  • checking rule compliance

  • worrying over security threats

  • inappropriate activities by employees being monitored

59
New cards

Electronic Communication Privacy ACT (ECPA)

prohibits interception of emails and reading stored email without court order, makes exception of business systems

60
New cards

National Labor Relation Board (NLRB)

sets rules and decides cases about worker-employer relations

-courts ruled against monitoring done to snoop on personal and union activities, or to track down whistle blowers

61
New cards

court decisions sometimes depend on whether an employee had a…

reasonable “expectation of privacy”

-many employers have their own privy policies regarding emails and voice mail

62
New cards

Legal reasons to monitor employee communications

  1. protect company intellectual property

  2. prevent criminal activity

  3. checking for violation to company policy

  4. investigation of harassment cases

  5. complying with regulatory reqs

  6. prevent personal use of employer facilities by company policy

  7. locate employees

  8. find business info when employees not available

63
New cards

personal social media

basing disciplinary action on personal social media is controversial because it extends employer control beyond work place

however social media is widespread in comparison to a private convo, making impact bigger

64
New cards

employees restrictions on nonwork social media do ….

NOT violate freedom of speech

65
New cards

gps tracks an employee location

used in hospitals for nurses for emergency purposes

used to track long haul trucks to reduce theft/optimize delivery

-employees complain of lost of privacy

66
New cards

expert info vs wisdom of the crowd

wisdom of the crowd - ratings by public of website 

lots of info online, lots of it is wrong

-search engines replacing libraries, but websites aren’t expert evaluation, they are ranked by popularity

however, if millions participate, the results will be useful

67
New cards

the need for responsible judgement

wikipedia is written by volunteers, biased and unaccurate

although anyone can write, most people do not

those that do usually are educated experts

68
New cards

what is the downside to filtering/tailoring software

we do not know what we missed when it is automatically filtered

69
New cards

the convenience of using a computer system and abdicating responsibility to exercise judgement can encourage…

mental laziness with serious consequences

70
New cards

Abdicating responsibility

people willing to let computers do their thinking

71
New cards

computer models

allow companies to play out “what-if” scenarios

allows for verification that design of product works before deployed

72
New cards

why models may not be accurate

-might not have complete knowledge of system we are modeling’

-the data describing the current conditions may be incomplete/inaccurate

-computing power may be inadequate for the complexity of the model

-difficult to numerically quantify variables that represent human values, choices

73
New cards

tends in tech

new tech only available to the wealthy

the time it takes for new tech to make its way to common people is decreasing

-government funds tech in school

entrepreneurs provide low cost options for people who cant afford it

74
New cards

As technology becomes more prevalent

the issues shift from the has the product/does not, to levels of service

75
New cards

The digital divide

5 billion people do not use the internet

non profits/computer companies are spreading computer access to people in developing countries

bringing tech to poor countries means pcs and laptops must work in extreme environments

people trying to shrink digital divide emphasize this access in appropriate ways to the local culture

76
New cards

Neo-luddite

a person who is critical/resists pace of modern technology

77
New cards

Neo-luddite views

-cause deskilling of jobs

-computers cause massive unemployment

-”manufacturing needs” we use them because they are there, not because they satisfy real needs

-cause social inequity

cause social disintegration (dehumanizing) cause communities to isolate 

78
New cards

neoluddite views

-seperate humans form nature, destroy environment

-usage in schools thwarts development of social skills, human values, and intellectual skills

-computers dont solve real problems

79
New cards

Luddites vs non-luddites, whats the purpose of technology 

luddites: eliminates jobs to reduce cost of productions (massive unemployment suggested)

non-luddites: reduce effort needed to produce good or service (improving wealth and standard of living )

both kinda say the same thing, but one has negative connotations, the other one has positive

80
New cards

pros of tech

increased life expectancy

elimination/reduction of many diseases

increased standard of living

assistive tech for those who have disabilities

81
New cards

the difficulty of prediction

each new tech finds new and unexpected uses

history of rich is full of wildly wrong predictions 

ex-weizenbaum argued against developing speech recognition tech.

because of expectations of cost vs benefit 

-new tech is often expensive, but costs drop as tech advances and the demand increases

82
New cards

technological singularity 

point at which artificial intelligence advances so far that we as humans ant comprehend whats on the other side

Making designs about technology::

-we cannot prepare for aftermath, but we can prepare for more gradual developments

so we select a decision making process to most likely product what people want

83
New cards

(where quiz stops) making decisions about tech

decentralize the design making process, and make it non-coercive, to reduce impact of mistakes and avoid manipulation by entrenched companies who fear competion

-prevents violations of liberty

84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards