Cyber security is the technology used to protect networks, users and data from attack or damage.
The Computer Misuse Act 1990 makes hacking and intentional damage to computers or data illegal.
Individual privacy and security
Identity theft
Loss or damage to personal or corporate data
Legislation: Computer Misuse Act
Hacking and distribution of viruses are criminal acts
Hacking industrial and public utility systems may have severe environmental consequences
Mobile technologies are very useful and a key part of modern life.
They can be tracked and communications can be intercepted.
Law enforcement agencies see this as positive but others think this is a threat to personal privacy.
Sharing personal data can have unforeseen and potentially harmful consequences
Personal privacy issues with tracking and use of data
Tracking criminal behaviour or tracking individuals
Trolling and other illegal or abusive activities
Mobile devices use large amounts of rare and harmful materials
Many devices are not sent for recycling increasing the demand for these materials
Wireless networks are being used very widely, at work, in homes, at shops and restaurants and even on public transport.
Wireless technologies can be vulnerable to attack and because they are so wide spread attacks can be very disruptive.
Wireless networks can be vulnerable to eavesdropping providing access to sensitive and personal data
Accessing data from wireless networks would be an offence under the Computer Misuse Act
Wireless networking can be vulnerable to attack causing widespread disruption
Cloud storage is file storage that is accessed via the internet meaning that data can be access from anywhere in the world.
Cloud storage needs internet access and the security is dependant on the company storing the data.
The files may be kept on servers in different countries and subject to the data protection laws of that country.
Many people store personal information which may be vulnerable to hacking and misuse
Many data centres are outside the UK, EU or USA and different data protection standards may apply.
Large data centres use a significant amount of energy to store vast quantities of data
Hacking is the misuse of computer material and is covered by the Computer Misuse Act 1990.
Data stored on the cloud may be more vulnerable to hacking than that stored on physical media on the user's own computer.
The privacy of an individual may be compromised from hacking, illegally accessing personal data
The Computer Misuse Act makes hacking illegal
Hacking of public utilities can compromise systems causing widespread disruption to public services
More and more of us are wearing smart devices such as activity monitors and watches.
These devices track movement and health data, that are shared with third parties.
Personal privacy may be compromised through tracking of a wearer's activity
Illegally accessing this data is outlawed in the UK under the Computer Misuse Act
Wearable devices like all mobile devices use rare and harmful materials meaning careful recycling is important
Computer based implants are becoming more widely used. For example:
Currently few devices exist that present any ethical issues
Currently few devices exist that present any legal issues
As with all mobile devices, these use rare and harmful materials requiring specialised recycling
Autonomous vehicles or driver-less cars are starting to become available.
They will communicate with each other to improve the overall safety and reduce the environmental impact to transport.
However, humans in other cars and pedestrians can be unpredictable, creating challenges for the manufacturers and sellers of autonomous vehicles.
Autonomous vehicles use artificial intelligence (AI) to monitor other vehicles and road users, what happens to this data?
When an accident happens, who is responsible? The owner of the vehicle, the manufacturer, or the developer of the software.
Where the majority of the vehicles are autonomous, they can communicate and cooperate providing a more efficient means of transportation.