0% found this document useful (0 votes)
20 views19 pages

Unit 8. Safety and Security

Uploaded by

reemkzm93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views19 pages

Unit 8. Safety and Security

Uploaded by

reemkzm93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
You are on page 1/ 19

ICT IGCSE Theory – Revision Presentation

Safety and
Security

C
h
a
p
t
e
r

8
:

S
a
f
e
t
y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.1 Physical Safety

Electrocution from Fire from sockets being


spilling
Ensure drinks
all drinks are kept overloaded
Ensure plug sockets or
away from the computers, ICT extension cables are
C labs or office desks. not overloaded.
h
a
p
t Physical Safety Risks
e
r
Equipment Tripping over
overheating trailing
Ensure ventilation in the room cables
Ensure cable ducts are used
8
is good and equipment is not to
: covered whilst in use. cover wires.
Ensure cables are tucked
away.
S Strategies to minimise potential safety risks:
a Regular maintenance of equipment to check if it is
f passing safety standards.
Regular check of the state of cables/plugs to ensure
e there is nothing exposed.
t Use of wireless connections to eliminate the use of
y cables.
Ensure potential trip hazards are under desks (bags,
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.2 e-Safety

Why personal data


should be
C confidential and
Users can be stalked or even
protected:
h Personal How to avoid
kidnapped – status updates
Data: inappropriate
a Contact details
can alert people of your
disclosure of
location at a particular time.
p (Phone Details can be stolen, copied personal data:
t number/email or pass on. Ensure privacy
address) Users could be blackmailed/ setting in social
e Address Details threatened into doing media sites have
r Personal Images
Payment details
inappropriate things. been activated.
Do not share
Customer details could be sold
including onto a third party. data via social
8 card and bank
details
media or
emails with
: Medical history strangers.
Political views Do not post
Family details inappropriate
S Discuss why e-safety is needed:
Passwords images or
a These days youngsters are not fully aware of the dangers the
content.
internet
f poses and the potential risks they may put themselves under. For
that reason eSafety lessons are taking place in schools to educate young
e people about the potential risks of using the internet
t appropriately so that they know how to stay safe whilst being online.
y
DPA:
Data Protection
Act
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.2 e-Safety

Minimise the Potential Dangers


C
h Personal Use of Only use trusted websites
a or those recommended by
Internet teachers.
p Only use a student friendly
General browsing –
t search
keeping up to date engine with safety filters.
e with current affairs. Restrict access to certain
r Researching for school content via ISP or filtering
projects. software.
Online shopping/banking Only email people already known
8 Use of Email to you or from your contacts
: list.
To keep in touch with
friends, family and co Think before opening an email
S workers. from an unknown person.
Be careful about emailing your
a To share information
sc hool ’s name or a
f including
picture of yourself in
attachments - Images,
e Presentations etc.
school uniform.
t To get in touch with
y organisations.
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.2 e-Safety

Minimise the Potential Dangers


C
h Use of Social Know how to block and
a Media
report
unwanted users in chat rooms.
p Never give out any personal
Share
Personal information
Use:
t about yourself to information online.
e your friends and Never arrange to meet
followers. strangers
r Business
especially in a secluded place.
Use:Promotion/
Awareness Keep adults informed about
8 your use of social media.
Online Gaming Never use real name when
: playing games online.
Online gaming is now very Use appropriate
S popular over many language when using
headsets and communicating
a platforms. More games are
with other gamers.
now providing multiplayer
f options with some games.
Only play online with
e trusted friends.
Maps especially created
t for online gamers.
y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is Hacking
Hacking?
To gain unauthorised access to a
C computer system
h without the user knowledge or
a permission.
Effects of Hacking?
p
t To delete, corrupt, copy and edit files.
Sensitive Data could be sold to
e competitors.
r Identity theft – to steal users identity.
To expose a company (for example wiki
leaks).
8 To cause disruption and stop production.
: Strategies to prevent hacking to
protect data
S Use of firewalls – sometimes part of the
a operating system.
Use of strong passwords which are
f frequently changed.
e Use of protection software to detect
t and block possible hacking attempts.
y Hire a professional hacker to test the
weaknesses of your system.
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is a computer virus ? Computer Virus


A computer virus is a piece of programming
C code/software which can install and replicate
h it self on to a computer system without the
a user’s permission.
p Effects of a computer virus ?
t Causes the computer to crash – become
slower
e Sometimes files can be deleted – leads to
r computer malfunction.
Data files can be copied by the hacker or
the files could be corrupted.
8 Could stop production until the virus has
: been quarantined.
Strategies to prevent computer
Install antivirus software and Downloaded exe (executable)
S virus
regularly update it. files could also be a virus
a Do not use software or USB from when they are installed by
f unknown sources. double clicking on them.
e Be careful about clicking on links
downloading
t from untrusted
attachments websites.
from
y unknown email addresses.
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is Spyware? Spyware


Is a software which can monitor your
C use of the computer (internet browsing)
h and monitor and log key pressed.
a Effects of Spyware?
p Spyware software will send the data back to
t person who planted the spyware software on
e your computer. This could include personal
r details like passwords and banking account
information.
Spyware software could also install additional
8 software to read
: cookie data and change web browsing
preferences. to prevent Spyware
Strategies
S The use of anti spyware software which
a is regularly
updated.
f The use of a pointing device to select
e characters when entering sensitive
t data.
y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is Phishing? Phishing


The recipient will receive an email which
C looks legitimate. The email will normally
h request the user to update their details which
a could be their password or payment details.
To update the users details they will have to
p click on a link which will take them to a fake
t website.
Effects of Phishing?
e
r The user will be tricked into entering their
details into a fake website. The sender of the
initial email will have gained personal details
8 from the user. These details can be used
: fraudulently or for identity theft.

Strategies to prevent Phishing


S
Use a filter on your email account so
a that only emails
f from an allowed users appear in your
e inbox.
t Always double check the URL and email
y address.
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is Pharming? Pharming


A malicious code installed onto a web server
C or computer will redirect users to a fake
h website even though they have typed in a
a legitimate URL address.
p Effects of Pharming?
t
The fake website will look like the real
e website (websites tend to look like a trusted
r websites to deceive the user). Users will be
tricked into entering their personal details.
8 Like Phishing this can lead to fraud or
identity theft.
: Strategies to prevent Pharming
Anti spyware software could eliminate
S pharming code from a computer.
a Always double check the URL to see if
f is the same one you typed in.
e
t
y
WWW.Y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is Smishing (SMS Phishing)? Smishing


Users will receive fake SMS (text) messages
C claiming they have won some sort of prize.
h Text message will appear to come from a
legitimate company. To claim the price users
a will have to call a premium phone number or
p go to a website and give personal details.
t Effects of Smishing?
e
The effects are very similar to Phishing and
r Pharming where personal details will be
obtained from users. However users could
8 incur additional costs when they ring the
premium number to claim a prize.
: Vishing: Uses a voice
Strategies to prevent Smishing messages which tricks users
S Double check the SMS message – check into calling a premium rate
for spelling telephone. Voice mail may
a sound legitimate and may
f mistakes. request for user to update
e Check the link of the website to see if it their details.
is legitimate?
t
Contact your bank directly If you
y are requested to change some
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is Spam Email? Spam Email


Spam (junk) email is sent out to recipients
C from a mailing list. The email could be part of
h a phishing scam or could be to promote
certain products. They are basically unwanted
a emails.
p Effects of Spam Email?
t If a spam email is part of a phishing scam
e then there is a chance your details could be
r obtained. The network could also become
slower or unresponsive if there is a lot of
unnecessary traffic flooding the network.
8
: Strategies to prevent Spam Email
Use a junk email filter to stop spam
S email coming into the inbox.
a Do not sign up for any commercial
f mailing lists.
Do not reply to spam email.
e Untick the check box if you are
t asked to give your email to a third
y party.
WWW.Y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

What is credit card fraud? Credit Card Fraud


Online credit card fraud is when a user is
C tricked into giving their personal and
h financial information. This could be via
a phishing, pharming or the use of spyware
p software.
Effects of credit card fraud?
t
e When a users account has been breached
r (credit/debit card details have been
obtained)then unauthorised purchases can
be made. Also money can be transferred out
8 of the account.
: Strategies to prevent credit card
fraud.
S Have a strong password on your
a account.
f Ensure website has a secure
e connection.
t Install and update spyware software.
Regularly check bank statement for
y any suspicious
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3
Biometrics
Security is
of Data
a method of authentication. It relies on unique
characteristics of human beings. Biometrics data is difficult to copy
and requires the user to be present so that this method of
authentication can be used.

C
h
a
p
t
e
r

8
:

S
a
f
e
t
y
WWW.Y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

To protect your personal data from being obtained


you need to be fully aware of phishing, pharming
and vishing scams. There are always signs which
C should cast doubt to whether you should disclose
h your personal information. Also the use of an
a updated spyware software would help improve
p security on your computer.
t
Any attempt to obtain illegal information
e should be reported to the authorities.
r Why is it
Fire Used
Firewall provides security to a
8 wall computer or
: Use Fire network.
wall Inte Is located between the computer
rs
rnet and internet connection.
Comp (Hardw
S are Firewalls will examine network traffic
uter and block and alert users to
a or
Passwords and User Name
softwa potential risks.
f re)
Passwords are a method of authentication. They are used
e frequently online when logging onto user accounts. If
t passwords are breached then your account may be hacked.
Details could be shared with other users of the internet.
y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

Encryption is the process of converting information into a


form that is meaningless
C to anyone except holders of a ‘key’.
h Encryption
a Key
p
t
e
r

8 Hello Data Data is Hello


: is 8512121 Decrypt
Encryp 5 ed
S ted
a Data in scrambled into a Data is now
f meaningless format. Even if in a format
e it is intercepted it would which can be
t mean nothing to hackers. understood.
y
WWW.Y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

C
h
a
p
t
e
r

8
:

S
a Digital Certificates
f They are used to verify the identity of the sender in an online business
e transaction. It also provides the opportunity for the receiver to give an
t encrypted response.
y
ICT IGCSE Theory – Revision Presentation

Safety and
Security
8.3 Security of Data

C
h
a
p
t
e
r

8
:

S
a
f
e
t
y

You might also like