Impact / Issues (M/E)
Explain in depth the impact that ONE or TWO of the following factors has on your chosen computer science concept. (M)
Students working at Merit level will explore ways the concept is used in the real world, and in particular how it affects end users.
Students should give examples showing how it relates to some of issues to be explored
Comprehensively explain the key problems or issues related to Artificial Intelligence. (E)
BIG ISSUES
Any of the following could be asked:
Increases in Computing Power: As computers become more powerful, brute force attacks become more feasible. Quantum computing is also on the horizon, potentially changing the landscape of security.
Need for White Hat Hackers: The distinction between "white hat" (ethical) and "black hat" (malicious) hackers is crucial. The demand for educated experts in computer security, particularly "white hat" hackers, is growing to protect against evolving threats.
Education and Digital Fluency: With the increasing use of digital devices, computer security awareness should be incorporated into education to ensure digital fluency and safety.
Cyber Warfare: The future of warfare is closely linked to computer security, with digital control systems vulnerable to attacks that could disrupt critical infrastructure.
Societal Behavior and Ethics: Ethical issues related to technology and communication are emerging, necessitating changes in behavior and laws.
Internet of Things (IoT) and Connectivity: The rise of IoT devices increases convenience but also exposes more entry points for cyberattacks, requiring advanced security protocols.
Artificial Intelligence (AI): AI automation brings efficiency but also risks if compromised, such as autonomous vehicles crashing or inaccurate medical diagnoses.
Data Integrity: Deliberate interference with data integrity could lead to the use of inaccurate information for decision-making.
Software and Firmware Updates: Regular updates for operating systems, drivers, software, and firmware are essential for maintaining computer security by patching vulnerabilities.
Firewalls: Organizations commonly use firewalls at internet entry points and on individual computers to protect against unauthorized access and cyber threats.