0% found this document useful (0 votes)
12 views40 pages

ICT Unit 8 PDF

The document outlines safety and security measures, defining key terms such as physical safety, e-safety, and data protection. It details various hazards like electrocution, fire risks, and personal injury, along with preventive measures. Additionally, it discusses data security threats like hacking and phishing, and protective strategies including authentication, encryption, and the use of firewalls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views40 pages

ICT Unit 8 PDF

The document outlines safety and security measures, defining key terms such as physical safety, e-safety, and data protection. It details various hazards like electrocution, fire risks, and personal injury, along with preventive measures. Additionally, it discusses data security threats like hacking and phishing, and protective strategies including authentication, encryption, and the use of firewalls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Unit 8:

Safety and
Security
Definition Of
Terms

1. Physical Safety
2. E-Safety
3. Data Protection Act
4. Personal Data
Physical
Safety

Concerned with the dangers that


could lead to serious injuries or
even loss of life
1. Electrocution

Spilling liquids/drinks on
electical equipment

Exposed wires / damaged


insulation

Unsafe electrics(Wall sockets)


2. Fire Hazard

Overloaded wall sockets

Overheating of computer
equipment (poor heat
dissipation)

Exposed wires causing a short


circuit
3. Tripping
Hazard
Trailing wires on the floor

Damaged carpets and other


flooring
4. Personal
Injury

Heavy equipment unstable or


falling from desks

Desks collapsing under


weight/desks not designed to
take the weight
How to
prevent these
hazards?
E-Safety

Keeping users safe while browsing


the internet
1. Data
Protection

Data protection Act


Legislation designed to
protect individuals.

Protect the rights of the


individual about whom data
is obtained.
2. Personal Data

Refers to any data concerning


a living person who can be
identified from the data itself

Personal Data
Sensitive Personal Data
3. E-Safety

Safe and responsible use of


technology.
Focused on the behaviour of
the user.
Security of
Data
Hacking

Act of gaining unauthorized/ illegal


access to a computer system
Phishing

Sends out legitimate-looking


emails to target users.

Once clicked the user will be


directed to a fake website
Vishing

Uses voicemail message to


trick the user into calling.
Tricks the user that the caller
works for a legitimate
company.
Smishing

Uses SMS system to send out


fake text messages.
Usually contains a URL
Pharming

Malicious code installed on a


user`s computer or on a web
server.
The user will be redirected to a
fake website without their
knowledge

No action from the user is


needed.
Malware

Software that is specifically


designed to disrupt or damage
the computer`s system
Different forms of Malware
Worms
Viruses
Ransomware
Adware, Trojan horse,
Keyloggers
Virus

Programs that replicates itself


with the intention of deleting
or corrupting files

Needs an active host


Worms

Can self replicate


Intention of spreading to other
computers and corrupt whole
networks.
Does not need an active host
Trojan Horse

Malicious Program which is


disguised as some legitimate
software
Usually installed after opening
the Trojan horse
Spyware
Keylogging Software
Ransomware
Key Logging
Software
It gather’s information by
monitoring a user’s keyboard
activities.
Screen recorders
Captures screens in
random intervals
Adware

It will attempt to flood the user


with unwanted advertising
Hard to remove because it
may be categorized as not
harmful.
Ransomware

Encrypts data on a user’s


computer and ‘hold the data
hostage’
Cybercriminals will ask ransom
money. The key will be sent to
the user(sometimes)
Card Fraud
Shoulder Surfing
Stealing personal information
while the victim is using cash
dispensing machines.

Cybercriminals use cameras,


listening over the phone or
simply peeking above your
shoulder.
Card Cloning
Skimmer
Allows criminals to record all
data stored on the magnetic
stripe (usually placed on ATM
slots)

Shimmer
Reads the data of a microchip
Uses the data to create fake
cards.
Protection Of
Data

Authentication = used to verify


data comes from a secure and
trusted source

Encryption = Strengthens internet


security
Biometrics

Fingerprint scans
Signature recognition
Retina Scans (Laser)
Iris Recognition (Photograph)
Face Recognition
Voice Recognition
Digital Certificates

Pair of files stored on a user’s


computer
Public Key
(Can be accessed by anyone)

Private Key
(Known to the computer user only)
Secure Socket Layer

Type of Protocol that allows data


to be sent and received securely
SSL Encrypts the data
The user and webserver are the only
ones who can understand the data.
Encryption

Uses a secret key that has the


capability of altering the
characters in a message.

Makes content unreadable unless


the recipient has the same secret
key
Encryption
Encryption key = Used to
encrypt/encode the message
Decryption key = Key used to
decipher the message
Cypher script= Message that
undergoes encryption
Plain text = Original message
Firewall

Sits between the user’s computer


and an external network
Filters incoming and outgoing
network traffic
Gateway = firewall that has a
hardware interface
Authentication

Refers to the ability of a user to


prove who they are

Three common factors


Something you know(Password)
Something you have(Phones)
Something that is unique to
you(Biometrics)
Requires two methods of authentication
User ID’s and Password
How to prevent getting hacked

Change passwords in a regular basis


Should not be easy to break (Avoid easy passwords)
Should be easy to remember
Strong passwords should contain at least:
One capital letter
One numerical value
One other keyboard character(Ex: @, *, &)

You might also like