Issues Flashcards

1
Q

Name 7 different security issues that could arise

A
Bluejacking
Physical threats
Hackers
Phishing
Unsecured wireless networks
Storing important info in cookies
Viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is bluejacking and how can it be prevented?

A

It is the process of sending unwanted messages to open Bluetooth connections.
It can be prevented by keeping Bluetooth switched off when it is not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give some examples of physical threats and how you can reduce the risk of them

A

Theft, flooding, fire and accidental damage.

Keep computers in locked rooms and back up the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you prevent hackers accessing your data?

A

Use firewalls, passwords and encrypt information travelling across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

Cons people into believing that an email or text is from a valid organisation so that they give their personal details away which can then be used to commit identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are unsecured wireless networks unsafe and what can you do to make it safer?

A

They allow other users to easily see and use your wireless network which could cost you.
Make sure to secure wireless networks with a password and encrypt data travelling over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is it important to manage cookies and how can you do it?

A

Storing important info in cookies makes it easier for other to gain access to your accounts.
You can manage and delete your cookies using options on your browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do viruses do and how can you prevent them corrupting your data?

A

They cause your computer to stop functioning properly and they spread easily over networks.
Keep Bluetooth switched off when not in use and make sure to regularly scan for viruses. Do not download from free file sharing websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 ways to ensure your data is well protected?

A

Install the latest updates for operating system and browser
Use encryption for the transmission and storage of data
Back up all your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name and explain 7 different privacy issues

A

Social networking sites- keep track of all your interactions and save them for later use
Search engines- record info about your searches including location, time spent searching and searches made. Info makes it easier for hackers to gain users’ personal info.
Tags- Photos online linked with name or other info is an invasion of privacy
Cookies- small text files storing info about your browsing habits and frequently visited websites
Identity Theft- Someone pretends to be someone else by collecting info about their identity
Hackers- Gain unauthorised access to your digital devices and access your personal info
Spyware- may be tricked into downloading it and it allows others to spy on info on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can you do to control your privacy?

A
  • Know how to use privacy settings on social media
  • Be aware of how much and what type of personal info you share online
  • Sign out of relevant accounts, esp on public computers
  • Educate friends about the risks and express your preferences to them
  • Know how to delete and manage cookies
  • Keep all personal info safe
  • Use firewalls, passwords and encrypt info sent across networks
  • Use up to date antispyware software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ways of monitoring people using ICT

A
  • Passports are scanned when we move in and out of countries
  • GPS could be used to track your location
  • Mobile phone companies track your movement as you move from base station to base station+ they know who we have been in phone contact with
  • Computer’s IP address tells search engines and social networking sites your location
  • Use of credit/debit cards allow banks to know when, where and money you spend
  • Email service companies know who you send emails to
  • Social networking sites store info about our movements and communications.
  • Online games monitor info about you and who you are playing with
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Positive effects of ICT on our health and safety

A
  • Friendships can be built on social networking sites
  • Easy to maintain contact with family and friends
  • Easier to access info to let us learn new things
  • Exercises at home using games such as the Wii can improve physical fitness
  • Accurate health and fitness monitoring
  • ICT skills can help us get better paid and more skilled jobs
  • Mobile phones help keep us safe by always being able to contact others
  • GPS technology can help us find our location and guide us along routes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Negative effects of ICT on our health and safety and how to combat them

A
  • Can contribute to obesity due to inactivity: Use of ICT should be balanced with other activities
  • People may overwork because work can be accessed from anywhere: Maintain work-life balance by considering when you use ICT for work
  • Overuse of social networking sites: Track time online and balance this with seeing family and friends in person
  • RSI can develop due to repeated actions: Change position or controller and use supports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Impact of networks on work

A
  • Teleworking
  • Collaborate easily with people all over the world
  • Location of office less important
  • Office/home networks allow access to range of resources and to share resources
  • Research for projects online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Impact of networks on communication

A
  • Socialise with people all over the world 24/7
  • Overuse of social networking sites
  • Rapid spread of news
17
Q

Impact of networks on creativity

A
  • Crowd sourcing: people collect news and contribute to websites
  • People become content generators for youtube, Wikipedia etc
18
Q

Impact of networks on shopping

A
  • Rapid access
  • Round the clock availability
  • No need to leave house
  • Research purchases more easily
19
Q

4 laws relating to the use of ICT

A
  • Data Protection Act
  • Computer Misuse Act
  • Copyright, Designs and Patent Act
  • Digital Economy Act
20
Q

Explain the Data Protection Act

A
Protects us against the misuse of our personal data that may be held by a range of organisations.
Personal data must be:
-processed fairly and lawfully
-adequate, relevant and not excessive
-accurate and up to date
-not kept longer than necessary
-kept secure
21
Q

Explain the Computer Misuse Act

A

Covers the misuse of computer equipment and illegal access to files.
The following are some things made illegal by it:

software piracy
planting viruses
hacking
fraud

22
Q

Explain the Copyright Act

A

Makes it a criminal offence to steal or copy media or other people’s work or ideas. Therefore it is illegal to

  • copy or distribute media without a proper license or the copyright owner’s permission
  • use purchased media on more computers than you have licenses for
23
Q

Explain the Digital Economy Act

A

This stops people illegally downloading media. Internet Service Providers can collect data about repeat offenders and their Internet access can be slowed or suspended.

24
Q

What is the digital divide?

A

The gap between people who do not have access to digital technology and those who do.

25
Q

Causes of the Digital Divide?

A
  • Low Income may lead to some items being less affordable
  • Disability or illness may make it difficult to learn how to use the internet
  • People living in remote areas may not have access to Internet or mobile phone coverage
  • Cultural factors- gender inequalities and religious beliefs can restrict access
  • Lack of skills or knowledge prevents people using ICT
  • Censorship- some governments may restrict and censor access to digital technology. Some sites are restricted for people in a certain country by tracking the IP address
  • Limited access to electricity- countries without a reliable electrical supply have less access
26
Q

Economic implications of the digital divide

A
  • People with better ict skills can get better paid jobs
  • Internet gives people access to a wider range of goods and services
  • Internet allows people to research products and get cheaper deals
  • Internet has lead to a rise in e-commerce and globalisation
  • Countries without good access to ICT are developing more slowly
27
Q

Educational implications of the digital divide

A
  • Students who use computers tend to do better at school
  • People with access to courses online courses can improve their skills and knowledge
  • Students need technology to make the most of the school’s personalised learning using VLEs
28
Q

Social implications of the digital divide

A
  • People with access to email, mobile phones and social networking can keep in touch more regularly with friends and family
  • People can feel “left out” if they do not have access to digital technology
  • Children with access to technology may play on games consoles rather than playing outside
29
Q

Cultural implications of digital divide

A
  • Some religious groups restrict their members’ access to digital technology
  • People may be stereotyped by gender, eg. boys and men may be given more access to, and education in, technology than girls and women
30
Q

Risks and responsible practice when using ICT

A
  • Computer equipment emits heat: Keep room well ventilated
  • Harmful bacteria can live on surfaces: Keep the computer and work surfaces clean
  • Incorrect use and positioning of equipment can cause health problems: use ergonomically designed equipment, take breaks or change position regularly
  • Use of computer equipment can cause eye strain: keep the room well lit and take regular screen breaks
  • Spilt drinks can cause an electric shock or damage your computer: keep food and drink away from equipment
  • Digital devices can overheat and catch fire- Fit smoke detectors and fire extinguishers. Do not overload electrical sockets.
31
Q

Sustainability Issues

A

E-waste

  • Old computer equipment ends up as electronic waste that goes to landfill sites
  • More developed countries are now sending e-waste to less developed countries

Pollution

  • Toxic substances from e-waste can get into the soil and water supplies
  • All digital devices use electricity and some require more energy to keep them cool. Electricity is traditionally generated by the combustion of fossil fuels which release greenhouse gases and can cause global warming

Finite Resources

  • Some elements used to create digital devices are in short supply so will run out one day
  • Electricity often comes from non-renewable resources such as coal and oil which are finite fossil fuels
32
Q

How to increase sustainability

A

Recycle

  • Recycle or reuse old digital devices
  • Donate unwanted devices to organisations which provide computers to poorer countries
  • Companies may offer to buy your unwanted digital devices to re-use them or some also take apart electronic waste and sell the parts

Reduce your impact

  • Use your digital devices for as long as you can before replacing them
  • Switch off your electronic devices when they are not in use and when they batteries are charged
  • Use devices that have a sleep ode when not in use

Renewable energy

  • Companies who run large servers are now locating to locations with cool climates and cheap sustainable electricity
  • Technology companies are starting to offer solar-powered devices