Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please help me to asnwer this question base on the below case study, What public good was done by the actions of dedicated security professionals

please help me to asnwer this question base on the below case study, What public good was done by the actions of dedicated security professionals in this case, consider the six general ethical principles that any AI system must preserve and protect based on fundamental rights as enshrined in the Charter of Fundamental Rights of the European Union (EU Charter), and in releIn 2015, just in time for the holiday season, Mattel released its WiFi-enabled Hello Barbie doll, which allowed the dolls microphone to record conversations with a child and send it via Wi-Fi to third parties for audio language processing, allowing the doll to then offer the child an appropriate natural language response. Because the conversations were stored in the cloud, parents were also able to monitor the childs conversations with the doll; parents can even share the audio clips of their childrens conversations online on the website of ToyTalk, the maker of the third-party software.
The toy raised a broad range of ethical issues, including the appropriateness of allowing parents to spy on their children during imaginative play. Also, as one legal scholar noted, In Mattels demo, Barbie asks many questions that would elicit a great deal of information about a child, her interests, and her family. This information could be of great value to advertisers and be used to market unfairly to children.10 However, security flaws were also prominent ethical concerns.
Security researchers quickly recognized significant security weaknesses in the doll that could be exploited by hackers for malicious purposes. One independent security researcher claimed that he was able to hack the device in such a way that he could access the user account information, stored audio files, and microphone for the doll, and potentially spoof ToyTalks third party website server to assume control of the dolls speech.
Somerset Recon, an organization devoted to security analysis and reverse engineering, eventually found 14 vulnerabilities in the system, including allowance for weak passwords, no protections against brute force password attacks (allowed unlimited password guesses), and exposure to URL redirect and phishing efforts. There was also the potential for malicious Javascript to be stored on ToyTalks third party website, allowing persistent backdoor access to a ToyTalk user account.11 Somerset Recon acknowledged that some efforts to provide adequate security had been made by ToyTalk, but also noted that there appeared to have been little to no pre- production security analysis and that the company appeared to be using their bug bounty program as a low-cost alternative to an independent security audit that could have identified the vulnerabilities before the product was released, and before real-world users were exposed to a post-market race between security researchers and malicious hackers to find the systems flaws.vant international human rights law.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro SQL Server Administration

Authors: Peter Carter

1st Edition

1484207106, 9781484207109

More Books

Students also viewed these Databases questions

Question

When is a truncated scale most likely to be acceptable?

Answered: 1 week ago

Question

2. How will the team select a leader?

Answered: 1 week ago