Skip to main content

Network Security and Social Implications

This document extends the network security and social implications topics covered in internet-and-data-communications.md with deeper analysis of threats, security measures, legal frameworks, and professional considerations.


Network Security Threats

Malware Taxonomy

Malware (malicious software) is software designed to damage, disrupt, or gain unauthorised access to a computer system.

TypeSelf-replicatingRequires HostPrimary Purpose
VirusYesYesCorrupt or modify files, spread to other files
WormYesNoSpread across networks, consume bandwidth
TrojanNoYesDisguised as legitimate software, create backdoor
RansomwareNoYesEncrypt files, demand payment for decryption key
SpywareNoYesMonitor user activity, collect data covertly
AdwareNoYesDisplay unwanted advertisements
RootkitNoYesHide malicious processes, maintain persistent access
KeyloggerNoYesRecord keystrokes to capture passwords and personal data
Botnet malwareNoYesEnrol the device in a botnet for DDoS or spam

Virus vs Worm -- the critical distinction:

A virus attaches itself to a legitimate file and requires user action (opening a file, running a program, booting from an infected disk) to execute and spread. A worm is a standalone program that self-replicates over network connections without requiring any user action or host file.

AspectVirusWorm
Host fileRequiredNot required
Spreads viaInfected files, mediaNetwork, email
User actionNeeded to activateNot needed
SpeedSlowerCan spread rapidly
DetectionFile integrity checksNetwork traffic analysis

Phishing and Social Engineering

Phishing is a type of social engineering attack that uses fraudulent communications (typically email) to trick victims into revealing sensitive information or installing malware.

Phishing TypeDescriptionTarget
Bulk phishingMass emails sent to many recipientsGeneral public
Spear phishingTargeted at a specific individual or organisationSpecific person
WhalingSpear phishing targeting senior executives (CEO, CFO)C-level execs
SmishingPhishing via SMS/text messagesMobile users
VishingPhishing via voice calls (often using VoIP)Phone users

Common social engineering techniques:

  1. Pretexting: Creating a fabricated scenario (a pretext) to obtain information. Example: impersonating an IT support technician who needs the victim's login credentials to "fix a problem."
  2. Baiting: Offering something enticing (free software, USB drive left in a car park) that contains malware.
  3. Tailgating: Physically following an authorised person through a secured door to gain access to a building or restricted area.
  4. Urgency/scarcity: Creating a false sense of urgency ("Your account will be locked in 24 hours") to pressure the victim into acting without thinking.
  5. Authority impersonation: Posing as a person of authority (bank manager, police officer, IT admin) to exploit trust.

Denial of Service (DoS) and Distributed DoS (DDoS)

A DoS attack overwhelms a target system with traffic or requests, making it unavailable to legitimate users.

Attack TypeDescription
DoSSingle source floods the target with traffic
DDoSMultiple compromised devices (botnet) attack simultaneously
SYN floodExploits TCP handshake: sends many SYN requests, never completes
UDP floodSends massive UDP packets to random ports, consuming resources
AmplificationUses third-party servers to amplify attack traffic (e.g., DNS, NTP)

Other Attack Vectors

AttackDescription
Man-in-the-middleAttacker intercepts communication between two parties, possibly altering it
SQL injectionInserts malicious SQL into input fields to manipulate or extract database data
Cross-site scripting (XSS)Injects malicious scripts into web pages viewed by other users
Brute forceSystematically tries all possible passwords until one works
Dictionary attackTries passwords from a precompiled list of common passwords

Security Measures

Firewalls -- Detailed Types

Basic firewall concepts are in internet-and-data-communications.md.

TypeOSI LayerMethodSpeedThoroughness
Packet filteringLayer 3Examines source/dest IP, port, protocolFastLow
Stateful inspectionLayer 3/4Tracks connection state, contextMediumMedium
Application-level (proxy)Layer 7Inspects actual application dataSlowHigh
Next-generation (NGFW)Layer 3--7Combines all above + IPS, deep packet inspection, TLS decryptionVariableVery High

Encryption -- Algorithms and Applications

Symmetric encryption algorithms:

AlgorithmKey LengthSpeedNotes
DES56 bitsFastObsolete (broken by brute force)
3DES168 bits (effective 112)MediumStill used in legacy systems
AES128/192/256 bitsVery fastCurrent standard; used by governments
Blowfish32--448 bitsFastUsed in some older applications

Asymmetric encryption algorithms:

AlgorithmKey LengthSpeedNotes
RSA2048+ bitsSlowMost widely used; based on prime factorisation
ECC256+ bitsFasterSmaller keys for equivalent security
DSA2048+ bitsSlowUsed for digital signatures

Key exchange problem: Symmetric encryption is fast but requires secure key distribution. Asymmetric encryption solves distribution but is slow. The practical solution is hybrid encryption: use asymmetric encryption to securely exchange a symmetric session key, then use the symmetric key for bulk data encryption.

Digital Signatures

A digital signature provides authentication, integrity, and non-repudiation for digital messages or documents.

Process:

  1. The sender creates a hash of the message using a cryptographic hash function (e.g., SHA-256).
  2. The sender encrypts the hash with their private key. This encrypted hash is the digital signature.
  3. The message and digital signature are sent to the receiver.
  4. The receiver decrypts the signature with the sender's public key to obtain the hash.
  5. The receiver independently hashes the received message and compares the two hashes.
  6. If they match, the message is authentic and has not been tampered with.
PropertyHow Digital Signatures Provide It
AuthenticationOnly the holder of the private key can create the signature
IntegrityAny change to the message changes the hash, breaking verification
Non-repudiationThe sender cannot deny having signed (only they have the private key)

Two-Factor Authentication (2FA)

2FA requires two independent forms of identification before granting access.

Factor TypeExamplesDescription
Something you knowPassword, PIN, security questionKnowledge factor
Something you havePhone, hardware token, smart cardPossession factor
Something you areFingerprint, facial recognition, iris scanBiometric factor

2FA mitigates password compromise: even if an attacker obtains the password, they still need the second factor (e.g., a time-based one-time password from a phone app) to gain access.

Intrusion Detection Systems (IDS)

TypeDescription
NIDSNetwork-based IDS; monitors network traffic for suspicious patterns
HIDSHost-based IDS; monitors activity on a single device
Signature-basedMatches traffic against a database of known attack patterns
Anomaly-basedEstablishes a baseline of normal behaviour and flags deviations

Security Best Practices Summary

MeasurePurpose
Strong passwordsResist brute force and dictionary attacks
2FAAdd a second authentication factor
Regular updates/patchesFix known vulnerabilities
Antivirus/anti-malwareDetect and remove malicious software
FirewallFilter network traffic
EncryptionProtect data confidentiality
BackupsEnable recovery from ransomware or data loss
User educationReduce human-factor vulnerabilities
Principle of least privilegeUsers have minimum necessary permissions

Data Protection and Privacy Laws

Hong Kong: Personal Data Privacy Ordinance (PDPO)

The PDPO (Cap. 486) is Hong Kong's primary data protection legislation. It is enforced by the Privacy Commissioner for Personal Data.

Six Data Protection Principles (DPPs):

DPPPrincipleRequirement
1Purpose and collectionPersonal data must be collected for a lawful purpose; data subject should be informed of the purpose
2Accuracy and retentionData must be accurate and kept no longer than necessary for the purpose
3UseData must only be used for the purpose stated at collection (or a directly related purpose)
4SecurityAppropriate security measures must be taken to protect against unauthorised access, processing, or erasure
5Information opennessData users must be open about their data handling practices
6AccessData subjects have the right to request access to their personal data and request correction

Key provisions:

  • Data users must appoint a Data Protection Officer (DPO) in certain cases.
  • Direct marketing use of personal data requires the data subject's opt-in consent.
  • Data users must notify the Privacy Commissioner of any data breach involving 500 or more data subjects.
  • Penalties for non-compliance include fines up to HKD 1,000,000 and imprisonment.

General Data Protection Regulation (GDPR) -- EU

GDPR applies to any organisation processing personal data of EU residents, regardless of where the organisation is located.

FeaturePDPO (Hong Kong)GDPR (EU)
JurisdictionHong Kong onlyGlobal (for EU residents' data)
Consent modelOpt-out for direct marketingOpt-in required (explicit consent)
Data breachNotify PCPD (500+ affected)Notify authority within 72 hours
Right to erasureNot explicitly statedYes ("right to be forgotten")
Data portabilityNot explicitly statedYes
FinesUp to HKD 1M + imprisonmentUp to EUR 20M or 4% global turnover
DPO requirementCase-by-caseMandatory for certain organisations

Data Protection Principles -- Comparison

Regardless of jurisdiction, all modern data protection laws share these core principles:

  1. Lawfulness, fairness, and transparency: Data must be processed legally and the data subject must be informed.
  2. Purpose limitation: Data collected for one purpose should not be used for unrelated purposes.
  3. Data minimisation: Collect only the minimum data necessary.
  4. Accuracy: Data must be kept accurate and up to date.
  5. Storage limitation: Data should not be kept longer than necessary.
  6. Security: Appropriate technical and organisational measures must protect data.
  7. Accountability: Organisations must demonstrate compliance.

Intellectual Property

Types of Intellectual Property

TypeProtectsDurationRegistration
CopyrightOriginal creative works (text, software, music, art, film)Creator's life + 50--70 yearsAutomatic (no registration required)
PatentInventions (new, useful, non-obvious processes or products)20 years from filingRequired (examination)
TrademarkBrand identifiers (names, logos, slogans, sounds)Indefinite (if renewed)Required
Trade secretConfidential business information (formulas, algorithms)As long as kept secretNo registration

Software Licensing

License TypeDescriptionSource CodeRedistributionExamples
ProprietaryAll rights reserved by the owner; licence governs useClosedProhibitedWindows, MS Office, Adobe
FreewareFree to use but may not be modified or redistributedClosedProhibitedSkype (original), Adobe Reader
SharewareFree trial with limited features or time; payment requiredClosedProhibitedWinZIP (trial)
Open sourceSource code is available; specific licence terms applyOpenVariesLinux, Apache, Python

Open Source Licenses

LicenseCopyleftCommercial useModificationDistributionPatent grant
GPL v3StrongYesYes, must release under GPLYes, same termsYes
LGPLWeakYesYesYesYes
MITNoneYesYesYes, with noticeNo explicit
Apache 2.0NoneYesYesYes, with noticeYes, explicit
BSDMinimalYesYesYes, with noticeNo explicit
Creative Commons (CC)VariesVariesVariesVariesNo

Copyleft (viral licensing): GPL requires that any derivative work must also be licensed under GPL. This means if you modify GPL software and distribute it, you must release your modifications under the same GPL terms. MIT and Apache are permissive licenses with no such requirement.

Creative Commons Licenses

Creative Commons (CC) licenses allow creators to specify how their work may be used by others.

LicenseCommercial UseModificationRequirement
CC BYYesYesCredit the author
CC BY-SAYesYesCredit + share under same license
CC BY-NCNoYesCredit + non-commercial only
CC BY-NDYesNoCredit + no derivatives
CC BY-NC-SANoYesCredit + non-commercial + share alike
CC BY-NC-NDNoNoCredit + non-commercial + no derivatives
CC0YesYesPublic domain (no restrictions)

Health and Safety Issues

Repetitive Strain Injury (RSI)

RSI is an umbrella term for conditions caused by repetitive movements, forceful exertions, and sustained or awkward postures.

ConditionCauseSymptoms
Carpal Tunnel SyndromePressure on median nerve in wristNumbness, tingling in fingers, weakness
TendonitisInflammation of tendons from repetitive motionPain, swelling, restricted movement
TenosynovitisInflammation of tendon sheathPain during movement, swelling
De Quervain'sRepetitive thumb movementPain at base of thumb

Prevention strategies:

  • Take regular breaks (at least 5 minutes per hour of typing).
  • Maintain a neutral wrist position (not bent up, down, or sideways).
  • Use an ergonomic keyboard and mouse.
  • Perform wrist and hand stretching exercises.
  • Ensure proper desk and chair height.

Eye Strain (Computer Vision Syndrome)

Extended screen use causes eye strain, characterised by dry eyes, blurred vision, headaches, and difficulty focusing.

The 20-20-20 rule: Every 20 minutes, look at something 20 feet (approximately 6 metres) away for 20 seconds. This allows the eye muscles to relax.

Additional measures:

  • Position the monitor 50--70 cm from the eyes, slightly below eye level.
  • Ensure adequate room lighting; avoid glare on the screen.
  • Use an anti-glare screen filter.
  • Blink regularly to prevent dry eyes.
  • Adjust text size and display brightness to comfortable levels.
  • Consider blue light filters for extended evening use.

Ergonomics

Ergonomics is the science of designing the workplace to fit the worker, reducing physical strain and improving productivity.

ComponentRecommended Setup
ChairAdjustable height, lumbar support, feet flat on floor
DeskElbow height when seated; keyboard at elbow level
MonitorTop of screen at or slightly below eye level, arm's length away
KeyboardAt elbow height, wrists neutral, elbows at 90 degrees
MouseSame level as keyboard, close enough to avoid reaching
LightingEven ambient lighting, no direct glare on screen
PostureBack supported, shoulders relaxed, no slouching

Other Health Concerns

ConcernDescriptionMitigation
Back/neck painPoor posture, unsuitable furniture, prolonged sittingErgonomic chair, standing desk, breaks
RadiationConcerns about EMF from screens and Wi-Fi devicesEvidence shows no significant harm at typical exposure levels
StressWork overload, constant connectivity, information overloadTime management, digital detox, exercise
ObesitySedentary lifestyle associated with heavy computer useRegular physical activity, movement breaks

Environmental Impact of ICT

E-Waste

Electronic waste (e-waste) is discarded electrical or electronic equipment. It is the fastest-growing waste stream globally.

Composition of e-waste:

ComponentExamplesEnvironmental Hazard
Heavy metalsLead, mercury, cadmiumToxic to nervous systems, carcinogenic
Precious metalsGold, silver, palladiumMining impact, but recoverable through recycling
PlasticsPVC, ABS, flame retardantsNon-biodegradable, release toxins when burned
GlassCRT monitors, LCD panelsLead in CRT glass; difficult to recycle
BatteriesLithium-ion, NiCdFire risk, heavy metal contamination

Global e-waste statistics (approximate):

  • Over 50 million metric tonnes generated annually worldwide.
  • Less than 20% is formally recycled.
  • A significant portion is shipped to developing countries for informal recycling, where workers (including children) are exposed to toxic substances.

Energy Consumption

ICT infrastructure consumes significant energy:

ComponentEnergy Consumption
Data centres1--2% of global electricity consumption
Network infrastructureGrowing with internet traffic growth
Personal devicesIncreasing with more powerful devices
Bitcoin miningComparable to some small countries

Green Computing Strategies

StrategyDescriptionImpact
Energy Star devicesHardware meeting energy efficiency standards20--50% energy reduction per device
Power managementSleep mode, auto-shutdown, screen dimmingReduces idle power consumption
VirtualisationRunning multiple virtual machines on fewer physical serversReduces hardware needs and energy use
Cloud computingShared resources, economies of scale in data centresMore efficient than local servers
Proper recyclingCertified e-waste recyclers, manufacturer take-back programmesRecovers precious metals, prevents toxins
Extend device lifeUpgrade components instead of replacing entire systemsReduces manufacturing and disposal impact
Renewable energyPowering data centres with solar, wind, or hydroelectricReduces carbon footprint
Responsible disposalFollow WEEE directive or local e-waste regulationsPrevents environmental contamination

Professional Codes of Conduct

Professional bodies establish codes of conduct to ensure their members act ethically and responsibly.

Key Professional Bodies

BodyJurisdictionFocus
ACM (Association for Computing Machinery)InternationalComputing professionals
BCS (British Computer Society)UK / InternationalIT professionals
HKCS (Hong Kong Computer Society)Hong KongIT professionals in HK
IEEE (Institute of Electrical and Electronics Engineers)InternationalEngineering ethics

Core Principles (ACM Code of Ethics)

  1. Contribute to society and to human well-being: Computing should benefit society. Professionals should consider the social impact of their work.
  2. Avoid harm: Avoid causing injury to others, including harm resulting from poor system design, security failures, or data breaches.
  3. Be honest and trustworthy: Do not misrepresent qualifications, claim credit for others' work, or provide misleading information.
  4. Be fair and act to avoid discrimination: Treat all people fairly regardless of race, gender, disability, religion, or other characteristics.
  5. Respect the work required to produce new ideas, inventions, creative works, and computing artifacts: Respect intellectual property rights; do not plagiarise or use others' work without attribution.
  6. Respect privacy: Protect personal data; collect only what is necessary; obtain informed consent.
  7. Maintain confidentiality: Respect the confidentiality of information entrusted to you.
  8. Competence: Only undertake work within your competence; maintain and develop professional skills.

Professional Responsibility in Practice

A computing professional confronted with an ethical dilemma should:

  1. Identify the stakeholders affected.
  2. Consider the applicable code of conduct and legal requirements.
  3. Evaluate the consequences of each possible action.
  4. Consult with colleagues or a professional body if uncertain.
  5. Document the decision and the reasoning behind it.

Censorship and Freedom of Information

Arguments for Internet Censorship

ArgumentReasoning
Protect childrenBlock access to inappropriate, violent, or harmful content
National securityPrevent the spread of classified or sensitive information
Prevent crimeDisrupt illegal activities (terrorism, drug trafficking)
Copyright protectionEnforce intellectual property rights by blocking piracy sites
Public moralityMaintain community standards and social harmony
Public healthCombat misinformation (e.g., false medical claims)

Arguments against Internet Censorship

ArgumentReasoning
Freedom of expressionCensorship violates the fundamental right to free speech
Right to informationCitizens have the right to access information freely
Government abuseCensorship powers can be misused to suppress dissent and opposition
Over-blockingFiltering technologies often block legitimate content
CircumventionTechnical measures (VPNs, proxies) make censorship ineffective
Economic impactCensorship can hinder innovation and economic growth

Methods of Internet Censorship

MethodDescription
DNS filteringBlock DNS queries for specific domain names
IP blockingBlock traffic to/from specific IP addresses
URL filteringBlock access to specific URLs based on keyword or category
Deep packet inspection (DPI)Examine packet contents to identify and block prohibited content
ThrottlingReduce bandwidth for specific services or protocols
Firewall rulesBlock specific ports, protocols, or network ranges

Common Pitfalls

  1. Virus vs Worm: A virus requires a host file and user action to spread. A worm is standalone and spreads automatically over networks. Do not confuse the two.

  2. Phishing is not hacking: Phishing tricks the user into voluntarily revealing information. It exploits human psychology, not technical vulnerabilities. Hacking involves unauthorised access through technical means.

  3. Symmetric vs Asymmetric encryption: Symmetric uses one shared key (fast); asymmetric uses a key pair (slow but solves key distribution). Most practical systems use both (hybrid encryption).

  4. Digital signature vs Encryption: A digital signature uses the sender's private key to sign (proving authenticity). Encryption uses the receiver's public key to protect confidentiality. These serve different purposes and use different keys.

  5. Copyright is automatic: Unlike patents and trademarks, copyright does not require registration. Original work is automatically protected from the moment of creation. However, registration can strengthen legal claims.

  6. Open source does not mean public domain: Open source software has a license that specifies terms of use. Public domain works have no restrictions. GPL software, for example, has strict copyleft requirements.

  7. PDPO vs GDPR scope: PDPO applies only within Hong Kong. GDPR applies globally to any organisation processing EU residents' data. GDPR is generally stricter and imposes higher penalties.

  8. Ergonomics is about prevention, not cure: RSI, eye strain, and back pain are cumulative conditions that develop over time. Prevention (proper posture, breaks, equipment) is far more effective than treatment after symptoms appear.

  9. E-waste contains valuable resources: Discarded electronics contain significant quantities of gold, silver, copper, and rare earth elements. Proper recycling recovers these materials and reduces the need for mining.

  10. Professional codes are not laws: Codes of conduct provide ethical guidelines, not legal requirements (though some principles may be enshrined in law). Violating a code of conduct may result in professional sanctions (loss of membership) but not necessarily legal penalties.


Practice Problems

Question 1: Malware Identification

For each scenario, identify the type of malware most likely involved and explain your reasoning.

(a) A user opens an email attachment disguised as an invoice. Their files become encrypted, and a message demands payment in cryptocurrency.

(b) A program replicates itself across a corporate network, consuming increasing bandwidth until the network becomes unusable.

(c) A user downloads free software from an unofficial website. Unwanted advertisements appear frequently in their web browser.

(d) A company discovers that an employee's login credentials have been recorded over several weeks, giving an attacker access to the company database.

Answer:

(a) Ransomware. The files are encrypted and a ransom is demanded, which is the defining characteristic of ransomware. The email attachment is the delivery vector (a trojan containing the ransomware payload).

(b) Worm. The program self-replicates across the network without requiring user action or a host file, which is the defining characteristic of a worm. The bandwidth consumption is a common effect of worm propagation.

(c) Adware. The primary symptom is unwanted advertisements. The free software from an unofficial website is likely bundled with adware, a common distribution method.

(d) Keylogger (spyware). The systematic recording of keystrokes to capture login credentials is characteristic of a keylogger. Keyloggers are a type of spyware designed to covertly collect sensitive information such as passwords, credit card numbers, and personal messages.

Question 2: Encryption and Digital Signatures

(a) Explain the difference between how a digital signature provides authentication and how encryption provides confidentiality. Which keys are used in each case?

(b) Alice wants to send a confidential, authenticated message to Bob. Describe the steps involved, specifying which keys are used at each stage.

(c) Why is hybrid encryption (combining symmetric and asymmetric encryption) used in practice?

Answer:

(a) Digital signature for authentication: Alice hashes her message and encrypts the hash with her private key. Bob decrypts the hash with Alice's public key and verifies it matches his own hash of the received message. This proves the message came from Alice (authentication) and was not modified (integrity).

Encryption for confidentiality: Alice encrypts the message with Bob's public key. Only Bob can decrypt it using his private key. This ensures only the intended recipient can read the message.

(b) Steps for a confidential, authenticated message:

  1. Alice generates a random symmetric session key.
  2. Alice encrypts the message with the session key (symmetric encryption -- fast).
  3. Alice encrypts the session key with Bob's public key (asymmetric encryption).
  4. Alice hashes the message and encrypts the hash with her private key (digital signature).
  5. Alice sends: encrypted message + encrypted session key + digital signature.
  6. Bob decrypts the session key with his private key.
  7. Bob decrypts the message with the session key.
  8. Bob decrypts the signature with Alice's public key and verifies the hash.

(c) Hybrid encryption combines the strengths of both approaches. Asymmetric encryption solves the key distribution problem (public keys can be freely shared) but is computationally slow. Symmetric encryption is fast but requires secure key exchange. By using asymmetric encryption only to exchange a short session key, and then using that session key for symmetric encryption of the bulk data, the system achieves both security and performance.

Question 3: Data Protection Law

(a) A Hong Kong online retailer collects customer email addresses during account registration. The retailer later uses these addresses to send promotional emails without obtaining consent. Under the PDPO, has the retailer violated any data protection principle? Explain.

(b) A social media company headquartered in Hong Kong processes data from users in both Hong Kong and the EU. Which data protection legislation applies, and why?

(c) Describe two measures a school should implement to comply with the PDPO when collecting student personal data.

Answer:

(a) Yes, the retailer has likely violated DPP 3 (Use limitation). Personal data was collected for the purpose of account registration, but then used for direct marketing (promotional emails) without obtaining the data subject's opt-in consent. Under the PDPO, using personal data for direct marketing requires the data subject's explicit consent (opt-in), and the data subject must be given the opportunity to opt out.

(b) Both the PDPO and GDPR apply. The PDPO applies because the company is headquartered in Hong Kong and processes data of Hong Kong residents. The GDPR applies because the company processes personal data of EU residents, regardless of where the company is located (extraterritorial scope of GDPR). The company must comply with both frameworks for the respective data subjects.

(c) Two measures:

  1. Purpose notification: When collecting student data, the school must inform students (and their parents/guardians for minors) of the specific purpose for which the data is being collected, who will have access, and how long it will be retained (DPP 1).

  2. Data security: The school must implement appropriate technical and organisational measures to protect student data from unauthorised access, loss, or disclosure. This includes access controls (only authorised staff can view student records), encryption of sensitive data, secure storage, and staff training on data protection obligations (DPP 4).

  3. Access and correction: The school must establish procedures for students (or parents) to request access to their personal data and to request corrections if the data is inaccurate (DPP 6).

Question 4: Software Licensing

(a) A student downloads a copy of proprietary software from a file-sharing website without paying for it. Explain two legal and two ethical issues with this action.

(b) A company modifies an open-source program licensed under GPL v3 and distributes it as part of a commercial product. What are their obligations under the GPL?

(c) Explain the difference between copyleft (GPL) and permissive (MIT) open source licenses.

Answer:

(a) Legal issues: (1) Copyright infringement -- the software is protected by copyright law, and unauthorised copying and distribution is illegal. (2) Software piracy carries potential civil penalties (fines, damages) and, in some jurisdictions, criminal penalties.

Ethical issues: (1) The developer invested time and resources in creating the software and deserves fair compensation. Using it without paying deprives the developer of rightful income. (2) Software piracy undermines the viability of the software industry, potentially reducing the incentive to develop new products.

(b) Under GPL v3, the company must: (1) make the complete source code of the modified program available to all recipients, including their modifications. (2) License the entire combined work under GPL v3. (3) Include a copy of the GPL v3 license and copyright notices. (4) Indicate what changes were made to the original code.

(c) Copyleft (GPL): Any derivative work must be distributed under the same copyleft license. This creates a "viral" effect where the freedom to use, modify, and redistribute is preserved in all derivatives. Commercial use is allowed, but modifications must remain open source.

Permissive (MIT): The author grants broad permission to use, copy, modify, and distribute the software, with minimal restrictions (primarily, retaining the copyright notice). Derivative works can be relicensed under any terms, including proprietary/closed source. There is no copyleft requirement.

Question 5: Scenario Analysis -- Security and Ethics

A hospital implements an electronic health record (EHR) system that stores patient medical records digitally.

(a) Identify three security threats to the EHR system and for each, describe a security measure to mitigate it.

(b) Under the PDPO, explain how the hospital should handle a patient's request to access their own medical records.

(c) A doctor accesses the medical records of a celebrity patient out of curiosity, without any medical reason. Discuss the ethical and legal implications.

Answer:

(a) Three threats and mitigations:

  1. Ransomware: Malware could encrypt patient records and demand payment. Mitigation: regular offline backups (3-2-1 rule), endpoint protection, network segmentation, staff training on phishing.

  2. Unauthorised access: An employee could access records they are not authorised to view. Mitigation: role-based access control (RBAC) -- doctors can only access records of their own patients; administrative staff have limited access to scheduling data only. Audit logging of all access.

  3. Phishing: An attacker could trick hospital staff into revealing login credentials via phishing emails. Mitigation: 2FA for all accounts, email filtering, regular security awareness training, simulated phishing exercises.

(b) Under DPP 6 (Access), the patient has the right to request access to their personal data held by the hospital. The hospital must comply with the request within 40 days. The hospital may charge a reasonable fee. If the hospital refuses the request, it must provide written reasons. The hospital should verify the identity of the requester before releasing the records.

(c) Ethical implications: This violates the ACM principle of "Respect privacy" -- accessing patient data without a legitimate medical need is a breach of patient confidentiality. It also violates the principle of "Avoid harm" by potentially causing emotional distress to the patient.

Legal implications: Under the PDPO, accessing personal data without authorisation and for a purpose unrelated to the data collection purpose constitutes a data access offence. This is a criminal offence under Section 18 of the PDPO, carrying penalties including a fine and imprisonment. The doctor could also face disciplinary action from the medical regulatory body.