0% found this document useful (0 votes)
59 views5 pages

Ict Theory Notes

The document discusses various cybersecurity and privacy risks including viruses, worms, trojan horses, spyware, adware, ransomware, phishing, smishing, vishing, pharming, hacking, and data protection laws. It provides examples of personal and sensitive data and outlines strategies to prevent security threats like using firewalls, strong passwords, and antivirus software.

Uploaded by

omar shafiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views5 pages

Ict Theory Notes

The document discusses various cybersecurity and privacy risks including viruses, worms, trojan horses, spyware, adware, ransomware, phishing, smishing, vishing, pharming, hacking, and data protection laws. It provides examples of personal and sensitive data and outlines strategies to prevent security threats like using firewalls, strong passwords, and antivirus software.

Uploaded by

omar shafiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Safety and security

● Electrocution: can be caused by spilling drinks or liquids on electrical


equipments or if there is exposed wires but this can be prevented by
checking that there is no live wires or being more careful with drinks in the
room where the wires or devices are present
● Fire hazard: can be caused overheated devices or overloaded sockets but
this can be prevented by; cleaning up the built-up dust in your devices
● Tripping hazard: is mainly caused by wires trailing on the floor or damaged
floor this can be prevent by taping the wires down to the walls or floors or
somewhere someone won't trip over them
● Personal injury: The main reason is that the desk might experience a lot of
pressure because so many heavy objects are on it causing it to fall or
break this can be prevented if you buy strong desks or desks that can
withhold a lot of weight/ pressure
● A lot of countries have their own data protection act (PDA). A few of these
are ;
■ Data must be fairly and lawfully processed.
■ Data can only be processed for the stated purpose.
■ Data must be adequate, relevant and not excessive.
■ Data must be accurate.
■ Data must not be kept longer than necessary.
■ Data must be processed in accordance with the data
subject’s rights.
■ Data must be kept secure.
■ Data must not be transferred to another country
■ unless they also have adequate protection
● Using the internet: make sure it’s a hypertext transfer protocol service
(https) website and next to the URL it has a padlock showing that it's a
safe website and don’t share your personal payment details anywhere on
an untrusted website.
● Sending and receiving and sending emails; make sure that it’s from a email
you know and its not a scam email, a lot of the times even some normal
email go to junk or spam emails section so make sure to differentiate
between normal and spam emails and don’t press on any un trusted links
from random emails you don’t recognise
● Taking part social media: make sure that all your data is kept safe, make
sure that your account is private, make sure that you’re not accepting any
people you don’t know, don’t post too much personal information and make
sure to not post personal pictures or videos
● Online gaming: make sure that you keep your info private, don’t ask people
personal questions about their; age, race, origin, gender or anything as
such, don’t use vulgar language and keep your webcam off to ensure your
privacy is maintained
● Examples of personal data:
○ Name
○ Address or email address
○ ID or Passport number(to prevent identity theft)
○ IP address
○ Date of Birth
○ Bank details
○ Photographs of yourself or close ones
● Examples of sensitive data:
○ Ethnicity
○ Political views
○ Religion
○ Gender
○ Age
○ Criminal record
○ Medical history
○ Biometric data
● Hacking:
○ this the act of gaining unauthorized access to someones computer
or their system
■ The effects of these could be;identity theft and deletion of
important files or data
● How to prevent it; we should use fire walls, make usage
of strong passwords so they are difficult to crack and
use anti hacking software
● Phishing,smishing,vishing:
○ In phishing the creator sends a email that looks very official looking
email with a attachment or link and when the receiver clicks on it, it
takes them to another website where they are fooled into giving the
website all their personal data
■ This leads to the person who sent the email having all your
important data and possibly committing identity fraud
● A way to prevent this is always be aware before clicking
on any links from email addresses you don't recognise
● Pharming:
○ In pharming basically what happens is malicious code is downloaded
on a user’s device or a web browser which them redirects them to a
website without their acknowledgement
■ This might lead to; the creator can gain the victims personal
information, identity theft or fraud
● This can prevented by downloading anti-spyware
software and be alert when on the web
● Different types of malware include:
○ Viruses:
■ Viruses are code that makes copies of itself and corrupts your
files or causes a laptop malfunction. A way to prevent this
from happening is downloading antivirus software
○ Worms:
■ Worms are like stand-alone viruses that can self replicate and
their intention is to spread to other computers and networks
and corrupt them and unlike viruses they don't need active
hosts. They usually take effect through malicious emails and
the key way to avoid this is download a very strong anti-virus.
○ A trojan house:
■ This essentially is a program or software or attachment that's
made with malicious intent, made to seem legitimate so that
no one suspects that there is anything wrong with it. Within the
code or program are malicious instructions embedded within
it. The main purpose of a “trojan horse” is to carry out any type
of harm to the user's computer/device. Once the trojan horse
is activated it gives cyber criminals access to all your personal
databases such as;IP address, passwords and other various
personal data.
● Spyware and ransomware are often installed within
someone's device via a trojan horse

Summary of 6 types of malware

Viruses Programs or program code that can replicate/copy itself with the intention of
deleting or corrupting
files, or cause the computer to malfunction; they need an active host program
on the target computer
or an operating system that has already been infected before they can run

Worms This is a type of stand-alone virus that can replicate itself with the intention of
spreading to others. computers; often uses networks to search out computers
with weak security which are prone to such attacks

Trojan horses These are malicious programs often disguised as legitimate software; they
replace all or part of the
legitimate software with the intent of carrying out some harm to the user’s
computer system

Spyware Software that gathers information by monitoring, for example, all the activity
on a user’s computer; the
gathered information is then sent back to the person who sent the software
(sometimes they monitor
key presses, which is referred to as key logging software)

Adware Software that floods a user’s computer with unwanted advertising; usually in
the form of pop-ups, but
can frequently appear in the browser address window redirecting the browser
to a fake website which
contains the promotional adverts

Ransomware Programs that encrypt the data on a user’s computer; a decryption key is sent
back to the user once
they pay a sum of money (a ransom); they are often sent via a Trojan horse
or by social engineering
Card fraud:
● Card fraud can happen in many ways, a few of them being;
○ Shoulder surfing

○ Card cloning
○ Key logging software

You might also like