Issues Flashcards
How can you stop hackers, phishing and viruses
You can keep your Bluetooth switched off when not in use to stop viruses.
To stop packages you can use firewalls, passwords and can encrypt the information travelling across networks.
You need to be able to identify phishing
Hannah switches off Bluetooth on her phone when not using it. Explain how this improve security
Other uses with Bluetooth devices her within range cannot connect with her device and send unwanted messages to her
John is worried about data security state two ways you can protect his data when using a smart phone
Set a pin/password,
Encrypt data
In the UK what protects our privacy online
The data protection act
Name two threats to our privacy online
Identity theft involve someone pretending to be another person I collecting information about their identity.
Cookies can help advertising relativement products but may be seen as a privacy issue.
How can you stop identity theft and cookies from violating your privacy
You can keep all your personal information safe to stop identity theft. You need to know how to delete a manager cookies
How was privacy achieved
Keeping your personal information safe,
Organisations you give your personal information to giving your information safe
Explain one way of preventing unauthorised users from reading data in a database
It can be encrypted so that it could only be read by people with the encryption key
Some criminals steal personal information from Internet users. List two methods that criminals could use to collect personal information online
Spyware, hacking
Name three security issues for digital devices
Hackers trying to get access to data without permission.
Viruses I designed to be harmful to destroy devices and to spread easily over networks.
Phishing cons people into believing that an email/text is from a valid organisation so they give away their username and password leading to identify theft.
Name three ways of monitoring people using ICT
Geo location information from GPS enabled devices which can track your position.
Your computers IP address provides clues to search engines about your geological location.
Explain how the irresponsible use of GPS data could play social network users at risk
GPS data gives away the users location. This could be dangerous if someone wanted to cause harm to that person as I could go and find them
State two ways in which people may track your communications
Emails,
Social networking
State three positive effects that ICT can have another physical and mental health
Friendships can be built online using social networking.
We can learn new things as information can be accessed easily.
Exercises at home using games such as the wii can improve physical fitness
Name three negative effects ICT can have an office are cool and mental health
Can contribute to obesity due to inactivity.
Eye strains come because by staring at the screen for a long time.
Accident him because by people using mobile phones whilst driving