Issues Flashcards
Name 7 different security issues that could arise
Bluejacking Physical threats Hackers Phishing Unsecured wireless networks Storing important info in cookies Viruses
What is bluejacking and how can it be prevented?
It is the process of sending unwanted messages to open Bluetooth connections.
It can be prevented by keeping Bluetooth switched off when it is not in use
Give some examples of physical threats and how you can reduce the risk of them
Theft, flooding, fire and accidental damage.
Keep computers in locked rooms and back up the data
How can you prevent hackers accessing your data?
Use firewalls, passwords and encrypt information travelling across networks.
What is phishing?
Cons people into believing that an email or text is from a valid organisation so that they give their personal details away which can then be used to commit identity theft.
Why are unsecured wireless networks unsafe and what can you do to make it safer?
They allow other users to easily see and use your wireless network which could cost you.
Make sure to secure wireless networks with a password and encrypt data travelling over the network.
Why is it important to manage cookies and how can you do it?
Storing important info in cookies makes it easier for other to gain access to your accounts.
You can manage and delete your cookies using options on your browser.
What do viruses do and how can you prevent them corrupting your data?
They cause your computer to stop functioning properly and they spread easily over networks.
Keep Bluetooth switched off when not in use and make sure to regularly scan for viruses. Do not download from free file sharing websites.
3 ways to ensure your data is well protected?
Install the latest updates for operating system and browser
Use encryption for the transmission and storage of data
Back up all your data
Name and explain 7 different privacy issues
Social networking sites- keep track of all your interactions and save them for later use
Search engines- record info about your searches including location, time spent searching and searches made. Info makes it easier for hackers to gain users’ personal info.
Tags- Photos online linked with name or other info is an invasion of privacy
Cookies- small text files storing info about your browsing habits and frequently visited websites
Identity Theft- Someone pretends to be someone else by collecting info about their identity
Hackers- Gain unauthorised access to your digital devices and access your personal info
Spyware- may be tricked into downloading it and it allows others to spy on info on your computer
What can you do to control your privacy?
- Know how to use privacy settings on social media
- Be aware of how much and what type of personal info you share online
- Sign out of relevant accounts, esp on public computers
- Educate friends about the risks and express your preferences to them
- Know how to delete and manage cookies
- Keep all personal info safe
- Use firewalls, passwords and encrypt info sent across networks
- Use up to date antispyware software
Ways of monitoring people using ICT
- Passports are scanned when we move in and out of countries
- GPS could be used to track your location
- Mobile phone companies track your movement as you move from base station to base station+ they know who we have been in phone contact with
- Computer’s IP address tells search engines and social networking sites your location
- Use of credit/debit cards allow banks to know when, where and money you spend
- Email service companies know who you send emails to
- Social networking sites store info about our movements and communications.
- Online games monitor info about you and who you are playing with
Positive effects of ICT on our health and safety
- Friendships can be built on social networking sites
- Easy to maintain contact with family and friends
- Easier to access info to let us learn new things
- Exercises at home using games such as the Wii can improve physical fitness
- Accurate health and fitness monitoring
- ICT skills can help us get better paid and more skilled jobs
- Mobile phones help keep us safe by always being able to contact others
- GPS technology can help us find our location and guide us along routes
Negative effects of ICT on our health and safety and how to combat them
- Can contribute to obesity due to inactivity: Use of ICT should be balanced with other activities
- People may overwork because work can be accessed from anywhere: Maintain work-life balance by considering when you use ICT for work
- Overuse of social networking sites: Track time online and balance this with seeing family and friends in person
- RSI can develop due to repeated actions: Change position or controller and use supports
Impact of networks on work
- Teleworking
- Collaborate easily with people all over the world
- Location of office less important
- Office/home networks allow access to range of resources and to share resources
- Research for projects online