Unit 1 - Ethics

Unit 1 - Ethics

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Quest Game JR 3

Quest Game JR 3

12th Grade

11 Qs

Roblox

Roblox

KG - 12th Grade

10 Qs

Logos Quiz

Logos Quiz

4th Grade - University

10 Qs

Desert Review Game

Desert Review Game

9th Grade

12 Qs

The Lucid Series: Android Uprising

The Lucid Series: Android Uprising

9th Grade

6 Qs

HACKER

HACKER

4th - 12th Grade

10 Qs

Logo quiz (Easy)

Logo quiz (Easy)

KG - Professional Development

11 Qs

brands 4 u

brands 4 u

KG - University

10 Qs

Unit 1 - Ethics

Unit 1 - Ethics

Assessment

Quiz

Other

9th - 12th Grade

Hard

Created by

Andrew Griffin

FREE Resource

8 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Societies

The relation between institutions and how they interact with one another and the laws and norms they present.

Political Structures

Groups of people characterized by common interests and values that are perpetuated by persistent social interaction.

Code of Ethics

The set of values and rules we adhere to as defined by the societies in which we live.

Ethics

An expression of values by designers and users in the institution of cybersecurity.

2.

MATCH QUESTION

1 min • 1 pt

Match the following

Institution

The act of considering the potential harms, benefits, and trade-offs involved in cybersecurity.

Ethical Reflection

Covenants that define a moral course of action and draw a line between right and wrong.

Ethical Obligations

Informal norms, shared understandings, and formal doctrines that constrain and prescribe actors’ interaction with one another.

3.

MATCH QUESTION

1 min • 1 pt

Match the following

White Hat Hackers

Hackers that weaponize cybersecurity in an unethical and highly illegal manner.

Gray Hat Hackers

Hackers that exist in an area that overlaps both ethical and unethical practices.

Black Hat Hackers

Ethical hackers who are often paid employees or contractors at a company, working as security specialists.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an intended design of software being used for another purpose?

When cybercriminals hack into a website to collect user’s personal information

When bad actors repurpose a worm for malicious purposes

When consumers use a business’s public WiFi to check their email

When users access a gaming site using a friend’s login credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

GPS was originally developed by the Department of Defense to assist soldiers and military vehicles in accurately determining their locations world-wide. Now, it is used by several people to go geocaching, where you use GPS to hide and seek containers (caches) at special locations marked by coordinates. Select the best answer for representing this additional use for GPS.

A tool being used in a way that was not intended by the designer

A tool being used in an unethical way because it is not its original purpose

A tool being used being used for a hobby and not the military is inappropriate

A tool being used in a new way conflicts with the designer’s code of ethics

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select one or more answers that best answer the question

Ethical obligations to society always coexist with ethical obligations to which of the following:

Family and Friends

Employer and Community

Yourself

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine you buy a new backpack online from Amazon. Amazon now knows what kind of a backpack you like. Amazon knows that several people who bought this particular backpack also bought a certain calculator. So Amazon starts advertising the calculator to you without your consent. Unbeknownst to you, Amazon gets a small fraction of the sales prices of each calculator sold by the calculator company. Which of the following statements pertain to this situation?

This is a violation of your security; you are no longer free from potential harm by others.

Amazon’s actions are not transparent; they should get your consent before advertising the calculator to you.

You have full autonomy over your purchasing history in this scenario.

The situation is likely to affect the resilience of Amazon and make it more susceptible to cyber attacks.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three countries have different laws regarding cybercrime, e-transactions, consumer protection, and privacy and data protection. Why might this be the case? Choose the best answer.

The different countries have varying degrees of developed legal systems and lawfulness/lawlessness.

Technology moves faster than laws can be created to govern it.

Certain countries are safe havens for black hat hackers.

These countries’ differing laws reflect their differing values and their laws.