Unit 1 - Ethics

Unit 1 - Ethics

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Virtual Reality/Technology

Virtual Reality/Technology

9th Grade - University

10 Qs

Amazon Aurora Serverless

Amazon Aurora Serverless

1st - 12th Grade

10 Qs

Logo quiz (Easy)

Logo quiz (Easy)

KG - Professional Development

11 Qs

crypto

crypto

KG - Professional Development

10 Qs

brands 4 u

brands 4 u

KG - University

10 Qs

Guess

Guess

12th Grade - University

12 Qs

HACKER

HACKER

4th - 12th Grade

10 Qs

Different Types of Hackers

Different Types of Hackers

1st - 9th Grade

7 Qs

Unit 1 - Ethics

Unit 1 - Ethics

Assessment

Quiz

Other

9th - 12th Grade

Hard

Created by

Andrew Griffin

FREE Resource

8 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Societies

An expression of values by designers and users in the institution of cybersecurity.

Political Structures

Groups of people characterized by common interests and values that are perpetuated by persistent social interaction.

Ethics

The set of values and rules we adhere to as defined by the societies in which we live.

Code of Ethics

The relation between institutions and how they interact with one another and the laws and norms they present.

2.

MATCH QUESTION

1 min • 1 pt

Match the following

Ethical Obligations

Informal norms, shared understandings, and formal doctrines that constrain and prescribe actors’ interaction with one another.

Institution

The act of considering the potential harms, benefits, and trade-offs involved in cybersecurity.

Ethical Reflection

Covenants that define a moral course of action and draw a line between right and wrong.

3.

MATCH QUESTION

1 min • 1 pt

Match the following

Gray Hat Hackers

Hackers that exist in an area that overlaps both ethical and unethical practices.

Black Hat Hackers

Hackers that weaponize cybersecurity in an unethical and highly illegal manner.

White Hat Hackers

Ethical hackers who are often paid employees or contractors at a company, working as security specialists.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an intended design of software being used for another purpose?

When cybercriminals hack into a website to collect user’s personal information

When bad actors repurpose a worm for malicious purposes

When consumers use a business’s public WiFi to check their email

When users access a gaming site using a friend’s login credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

GPS was originally developed by the Department of Defense to assist soldiers and military vehicles in accurately determining their locations world-wide. Now, it is used by several people to go geocaching, where you use GPS to hide and seek containers (caches) at special locations marked by coordinates. Select the best answer for representing this additional use for GPS.

A tool being used in a way that was not intended by the designer

A tool being used in an unethical way because it is not its original purpose

A tool being used being used for a hobby and not the military is inappropriate

A tool being used in a new way conflicts with the designer’s code of ethics

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select one or more answers that best answer the question

Ethical obligations to society always coexist with ethical obligations to which of the following:

Family and Friends

Employer and Community

Yourself

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine you buy a new backpack online from Amazon. Amazon now knows what kind of a backpack you like. Amazon knows that several people who bought this particular backpack also bought a certain calculator. So Amazon starts advertising the calculator to you without your consent. Unbeknownst to you, Amazon gets a small fraction of the sales prices of each calculator sold by the calculator company. Which of the following statements pertain to this situation?

This is a violation of your security; you are no longer free from potential harm by others.

Amazon’s actions are not transparent; they should get your consent before advertising the calculator to you.

You have full autonomy over your purchasing history in this scenario.

The situation is likely to affect the resilience of Amazon and make it more susceptible to cyber attacks.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three countries have different laws regarding cybercrime, e-transactions, consumer protection, and privacy and data protection. Why might this be the case? Choose the best answer.

The different countries have varying degrees of developed legal systems and lawfulness/lawlessness.

Technology moves faster than laws can be created to govern it.

Certain countries are safe havens for black hat hackers.

These countries’ differing laws reflect their differing values and their laws.