Unit 1 - Ethics

Unit 1 - Ethics

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Solving Quadratics in the Calculator

Solving Quadratics in the Calculator

9th Grade

10 Qs

AP Exams

AP Exams

12th Grade

13 Qs

ACT Calculator Strategies

ACT Calculator Strategies

10th - 12th Grade

10 Qs

APES Biomes Review Quiz

APES Biomes Review Quiz

11th - 12th Grade

12 Qs

SAT Boot Camp Review

SAT Boot Camp Review

9th - 12th Grade

12 Qs

Guess

Guess

12th Grade - University

12 Qs

South America Vocabulary Quiz

South America Vocabulary Quiz

9th Grade

10 Qs

Tropical Rainforests

Tropical Rainforests

9th - 12th Grade

11 Qs

Unit 1 - Ethics

Unit 1 - Ethics

Assessment

Quiz

Other

9th - 12th Grade

Hard

Created by

Andrew Griffin

FREE Resource

8 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Ethics

Groups of people characterized by common interests and values that are perpetuated by persistent social interaction.

Societies

The set of values and rules we adhere to as defined by the societies in which we live.

Political Structures

An expression of values by designers and users in the institution of cybersecurity.

Code of Ethics

The relation between institutions and how they interact with one another and the laws and norms they present.

2.

MATCH QUESTION

1 min • 1 pt

Match the following

Ethical Reflection

Informal norms, shared understandings, and formal doctrines that constrain and prescribe actors’ interaction with one another.

Institution

Covenants that define a moral course of action and draw a line between right and wrong.

Ethical Obligations

The act of considering the potential harms, benefits, and trade-offs involved in cybersecurity.

3.

MATCH QUESTION

1 min • 1 pt

Match the following

Black Hat Hackers

Ethical hackers who are often paid employees or contractors at a company, working as security specialists.

White Hat Hackers

Hackers that exist in an area that overlaps both ethical and unethical practices.

Gray Hat Hackers

Hackers that weaponize cybersecurity in an unethical and highly illegal manner.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an intended design of software being used for another purpose?

When cybercriminals hack into a website to collect user’s personal information

When bad actors repurpose a worm for malicious purposes

When consumers use a business’s public WiFi to check their email

When users access a gaming site using a friend’s login credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

GPS was originally developed by the Department of Defense to assist soldiers and military vehicles in accurately determining their locations world-wide. Now, it is used by several people to go geocaching, where you use GPS to hide and seek containers (caches) at special locations marked by coordinates. Select the best answer for representing this additional use for GPS.

A tool being used in a way that was not intended by the designer

A tool being used in an unethical way because it is not its original purpose

A tool being used being used for a hobby and not the military is inappropriate

A tool being used in a new way conflicts with the designer’s code of ethics

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select one or more answers that best answer the question

Ethical obligations to society always coexist with ethical obligations to which of the following:

Family and Friends

Employer and Community

Yourself

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine you buy a new backpack online from Amazon. Amazon now knows what kind of a backpack you like. Amazon knows that several people who bought this particular backpack also bought a certain calculator. So Amazon starts advertising the calculator to you without your consent. Unbeknownst to you, Amazon gets a small fraction of the sales prices of each calculator sold by the calculator company. Which of the following statements pertain to this situation?

This is a violation of your security; you are no longer free from potential harm by others.

Amazon’s actions are not transparent; they should get your consent before advertising the calculator to you.

You have full autonomy over your purchasing history in this scenario.

The situation is likely to affect the resilience of Amazon and make it more susceptible to cyber attacks.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three countries have different laws regarding cybercrime, e-transactions, consumer protection, and privacy and data protection. Why might this be the case? Choose the best answer.

The different countries have varying degrees of developed legal systems and lawfulness/lawlessness.

Technology moves faster than laws can be created to govern it.

Certain countries are safe havens for black hat hackers.

These countries’ differing laws reflect their differing values and their laws.