1/42
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Lots of resources are needed to…
Produce
Distribute
Use
Manufacture
Made from metal and plastic
Limited resources
Can be toxic
Water consumption
Use
Web servers and computers
Need to left running continuously
Requires lots of energy
Disposal
Hard to recycle
landfill
Contain toxic things
Cannot be burnt without releasing toxic gases
Throwaway culture
Replacement cycle
How often digital devices are replaced
Worsened by a throwaway culture
Ethical concerns
Moral principals that control our behaviour
Robot
Can carry out a task by following a precise set of instructions
Responds to a stimulus to do something specific
Dumb robot
Repeat same program over again
Smart Robot
Carries out more complex task
Can adapt and learn
Issues with robotics
Accountability
Safety
Algorithmic bias
Legal liability
Accountability
Choices of AI have consequences
Who is accountable
How does it make its decisions
Safety
It makes its own choices
Who's safety should be prioritised
Algorithmic bias
When it has it make a decision that favours one group over another
Bias loan approvals
Legal liability
When AI leads to death or criminal activity
Who is responsible
Programmer
Manufacturer
Consumer
Solutions for issues
Auditing
Human oversight
Transparency
Intellectual property
Refers to a creation of the human mind
Types of protection for Intellectual Property
Copyright
Patent
Trademark
Licensing
Copyright
Protects creative and original works
Creator has exclusive rights to reproduce, display etc similar works from the OG creation
Creators life + 70 years
Automatic
Creative works like books
Patent
Non-obvious discoveries
Make, use, sell object
20 years
Not automatic
Inventions
Trademark
Recognisable sign/logo
Prevents others from using it
Forever if renewed
Not automatic
What is malware
Causes data to be deleted, corrupted
Computer crashes
Types of Malware
Virus
Worms
Trojans
Key logger
Ransomware
Virus
Replicates itself
Causes unwanted and unexpected events to occur
Corrupts files
Deletes data
Worms
Similar to virus
Spread to other drives on a network
Spread via email, network connection or Ims
Trojans
Disguise themselves as legitimate software
Contain malicious code
Key logger
Record your screen
Log your keystrokes
Gain access to your passwords
Ransomware
Encrypts your documents
Demand for money
No guarantee you'll get info back
Exploitation of vulnerabilities
Hacker
Unpatched software
Out of data antimalware
Hacker
Exploits technical vulnerabilities
Seek out opportunities
Unpatched software
Flaws and vulnerabilities may exist
Provides an opportunity for hackers
Leads to data breaches or malware
Out of date antimalware
Not effective at protecting against new threats
Malware have unique signature
Out of date won't have updated list
Can lead to data/financial loss
Social engineering
Exploiting human weaknesses
Targeting people
Manipulate people into giving up data
Types of Social Engineering
Pretexting
Phishing
Baiting
Quid Pro Quo
Pretexting
Uses an invented scenario
So that target will divulge information
Phishing
Sending fraudulent emails/messages to lots of people
Pretend to be a reputable company
Gain access
Baiting
Offer something appealing
Something for free or a prize
Directs to fake website or something else
Quid Pro Quo
Desire to repay a kind gesture
Similar to baiting but offers a service
Offer to fix computer
Cybersecurity
Antimalware
Encryption
AUP
Backup and Recovery
Antimalware Types
Combination of different software to prevent viruses
Such as
Anti-virus
Anti-spam
Anti spyware
How does antimalware work
Scans through email attachments, websites and files for issues
Compares to unique malware signature
Blocks immediately
Monitors behaviour
Rapid deletion
Attempt to access sensitive data
Check updates
Encryption
Encoding so cannot be read by anyone
Needs decryption key
Uses complex math algorithm to scramble text
Asymmetric encryption
Private key, public key encryption
Used for websites
Used where sensitive data is transmitted
AUP
Outlines what is and isn't acceptable on network
Expectations of responsible technology use is clear
Way to hold people accountable
Does not stop misuse
Requires users to sign terms and conditions
Back up and recovery
Set out steps in case data is lost
Hardware failure
Cyber attack
Software issues
Types
Off-site storage
Stand by equipment
Replaces primary equipment in case of failure