Topic 5 - Issues and Impacts

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Lots of resources are needed to…

  • Produce

  • Distribute

  • Use

2
New cards

Manufacture

  • Made from metal and plastic

  • Limited resources

  • Can be toxic

  • Water consumption

3
New cards

Use

  • Web servers and computers

  • Need to left running continuously

  • Requires lots of energy

4
New cards

Disposal

  • Hard to recycle

    • landfill

  • Contain toxic things

  • Cannot be burnt without releasing toxic gases

  • Throwaway culture

5
New cards

Replacement cycle

  • How often digital devices are replaced

  • Worsened by a throwaway culture

6
New cards

Ethical concerns

Moral principals that control our behaviour

7
New cards

Robot

  • Can carry out a task by following a precise set of instructions

  • Responds to a stimulus to do something specific

8
New cards

Dumb robot

Repeat same program over again

9
New cards

Smart Robot

  • Carries out more complex task

  • Can adapt and learn

10
New cards

Issues with robotics

  • Accountability

  • Safety

  • Algorithmic bias

  • Legal liability

11
New cards

Accountability

  • Choices of AI have consequences

  • Who is accountable

  • How does it make its decisions

12
New cards

Safety

  • It makes its own choices

  • Who's safety should be prioritised

13
New cards

Algorithmic bias

  • When it has it make a decision that favours one group over another

  • Bias loan approvals

14
New cards

Legal liability

  • When AI leads to death or criminal activity

  • Who is responsible

    • Programmer

    • Manufacturer

    • Consumer

15
New cards

Solutions for issues

  • Auditing

  • Human oversight

  • Transparency

16
New cards

Intellectual property

Refers to a creation of the human mind

17
New cards

Types of protection for Intellectual Property

  • Copyright

  • Patent

  • Trademark

  • Licensing

18
New cards

Copyright

  • Protects creative and original works

  • Creator has exclusive rights to reproduce, display etc similar works from the OG creation

  • Creators life + 70 years

  • Automatic

  • Creative works like books

19
New cards

Patent

  • Non-obvious discoveries

  • Make, use, sell object

  • 20 years

  • Not automatic

  • Inventions

20
New cards

Trademark

  • Recognisable sign/logo

  • Prevents others from using it

  • Forever if renewed

  • Not automatic

21
New cards

What is malware

  • Causes data to be deleted, corrupted

  • Computer crashes

22
New cards

Types of Malware

  • Virus

  • Worms

  • Trojans

  • Key logger

  • Ransomware

23
New cards

Virus

  • Replicates itself

  • Causes unwanted and unexpected events to occur

  • Corrupts files

  • Deletes data

24
New cards

Worms

  • Similar to virus

  • Spread to other drives on a network

  • Spread via email, network connection or Ims

25
New cards

Trojans

  • Disguise themselves as legitimate software

  • Contain malicious code

26
New cards

Key logger

  • Record your screen

  • Log your keystrokes

  • Gain access to your passwords

27
New cards

Ransomware

  • Encrypts your documents

  • Demand for money

  • No guarantee you'll get info back

28
New cards

Exploitation of vulnerabilities

  • Hacker

  • Unpatched software

  • Out of data antimalware

29
New cards

Hacker

  • Exploits technical vulnerabilities

  • Seek out opportunities

30
New cards

Unpatched software

  • Flaws and vulnerabilities may exist

  • Provides an opportunity for hackers

  • Leads to data breaches or malware

31
New cards

Out of date antimalware

  • Not effective at protecting against new threats

  • Malware have unique signature

  • Out of date won't have updated list

  • Can lead to data/financial loss

32
New cards

Social engineering

  • Exploiting human weaknesses

  • Targeting people

  • Manipulate people into giving up data

33
New cards

Types of Social Engineering

  • Pretexting

  • Phishing

  • Baiting

  • Quid Pro Quo

34
New cards

Pretexting

  • Uses an invented scenario

  • So that target will divulge information

35
New cards

Phishing

  • Sending fraudulent emails/messages to lots of people

  • Pretend to be a reputable company

  • Gain access

36
New cards

Baiting

  • Offer something appealing

  • Something for free or a prize

  • Directs to fake website or something else

37
New cards

Quid Pro Quo

  • Desire to repay a kind gesture

  • Similar to baiting but offers a service

  • Offer to fix computer

38
New cards

Cybersecurity

  • Antimalware

  • Encryption

  • AUP

  • Backup and Recovery

39
New cards

Antimalware Types

  • Combination of different software to prevent viruses

  • Such as

    • Anti-virus

    • Anti-spam

    • Anti spyware

40
New cards

How does antimalware work

  • Scans through email attachments, websites and files for issues

    • Compares to unique malware signature

    • Blocks immediately

    • Monitors behaviour

      • Rapid deletion

      • Attempt to access sensitive data

  • Check updates

41
New cards

Encryption

  • Encoding so cannot be read by anyone

  • Needs decryption key

  • Uses complex math algorithm to scramble text

  • Asymmetric encryption

    • Private key, public key encryption

    • Used for websites

  • Used where sensitive data is transmitted

42
New cards

AUP

  • Outlines what is and isn't acceptable on network

  • Expectations of responsible technology use is clear

  • Way to hold people accountable

    • Does not stop misuse

  • Requires users to sign terms and conditions

43
New cards

Back up and recovery

  • Set out steps in case data is lost

    • Hardware failure

    • Cyber attack

    • Software issues

  • Types

    • Off-site storage

    • Stand by equipment

      • Replaces primary equipment in case of failure