SlideShare a Scribd company logo
1 of 5
ICT IGCSE Theory – Revision Presentation
2015 – 2016 Questions (New Syllabus)
Chapter
8
-
Safety
and
Security
Describe four strategies that you could use to minimise the dangers of using social
networking sites to make new friends.
• Know how to block and report unwanted users,
• Never arrange to meet anyone alone
• Always tell an adult first when arranging to meet someone
• Always meet in a public place
• Avoid inappropriate disclosure of personal data/set privacy settings/Avoid giving
email address or phone number when chatting
• Avoid inappropriate disclosure of your own name/Avoid giving your full name
• Avoid giving your address
• Avoid giving your school name or displaying a picture in school uniform
• Do not display pictures taken at home/Do not display pictures taken of the school
with the name attached/Do not send pictures/videos of yourself to strangers
• Ensure that the person you are befriending has very secure privacy settings
• Check profiles before contacting people
• Verify person’s contact details with other trusted people/friends
ICT IGCSE Theory – Revision Presentation
2015 – 2016 Questions (New Syllabus)
Chapter
8
-
Safety
and
Security
Explain why encryption is needed when transmitting data.
• To cause data to be scrambled/encoded
• Protects sensitive data…
• …from being understood if it falls in to the wrong hands
• Only user/computer with key can understand data
There are many safety issues associated with the use of computers. Describe three
of these issues.
• Electrocution by touching loose/bare wires/spilling liquids on electrical contacts
• Tripping and falling over trailing wires or cables
• Physical injury to feet/legs, etc. caused by heavy equipment falling
• Fire caused by too many plugs in multisocket and thereby
overheating/overheating of equipment
ICT IGCSE Theory – Revision Presentation
2015 – 2016 Questions (New Syllabus)
Chapter
8
-
Safety
and
Security
There are many health issues associated with the use of computers.
Name three of these health issues and for each one describe, in detail, a different
cause.
• Headaches/eyestrain
• From staring at screen continuously
• RSI in fingers
• From continual typing/repetitive clicking of mouse
• RSI in wrists
• From repetitive clicking of mouse/continual typing
• Backache
• From sitting in same position all day
ICT IGCSE Theory – Revision Presentation
2015 – 2016 Questions (New Syllabus)
Chapter
8
-
Safety
and
Security
• The action of sending emails to fraudulently obtain another person’s bank
details is called Phishing
• The action of illegally installing malicious code which redirects a person to a
fraudulent website with the purpose of obtaining that person’s bank details is
called Pharming
• Unsolicited bulk emails are called Spam
• The action of sending text messages to fraudulently obtain another person’s
bank details is called Smishing
• An internet protocol for delivering private messages using cryptography is called
https/SSL/TLS
• An attachment to an electronic message used to verify the identity of the sender
is called a digital certificate
ICT IGCSE Theory – Revision Presentation
2015 – 2016 Questions (New Syllabus)
Chapter
8
-
Safety
and
Security
Describe four methods you could use to minimise the likelihood of receiving spam
emails.
• Use a spam filter/anti-spam software
• Do not reply to spam/suspicious messages
• Do not click on any links/attachments in a spam/suspicious message
• Use a disposable email address
• Use a complex email user name
• Do not give out your email address online/do not register using email on
untrusted websites/opt
• out of marketing
• Read messages as text
• Do not use your email address as an online username
• Changing to an email provider who filter spam

More Related Content

What's hot

Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMKamran Ashraf
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionShamir George
 
Computer memory
Computer memoryComputer memory
Computer memorynikunjandy
 
Virtual memory
Virtual memoryVirtual memory
Virtual memoryAnuj Modi
 
Server system architecture
Server system architectureServer system architecture
Server system architectureFaiza Hafeez
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Chapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC HardwareChapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC Hardwareaskme
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgradeDana Popescu
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)Dev Dorse
 

What's hot (20)

Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Cache memory
Cache memoryCache memory
Cache memory
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 
File management
File managementFile management
File management
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document Production
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Server system architecture
Server system architectureServer system architecture
Server system architecture
 
Storage Device
Storage DeviceStorage Device
Storage Device
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Chapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC HardwareChapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC Hardware
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
 
Multiprocessing operating systems
Multiprocessing operating systemsMultiprocessing operating systems
Multiprocessing operating systems
 
Unix case-study
Unix case-studyUnix case-study
Unix case-study
 
First step to internet
First step to internet First step to internet
First step to internet
 
IGCSE ICT Theory
IGCSE ICT Theory IGCSE ICT Theory
IGCSE ICT Theory
 

Similar to Chapter 8 - Safety and Security.pptx

Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)Jenine Sanchez
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying Karthik Kumar
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15Priya Harracksingh
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 

Similar to Chapter 8 - Safety and Security.pptx (20)

COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
 
8._safety_and_security.pdf
8._safety_and_security.pdf8._safety_and_security.pdf
8._safety_and_security.pdf
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 

More from MegatRidwanbinMegatA (11)

DC16_Ch08.pptx
DC16_Ch08.pptxDC16_Ch08.pptx
DC16_Ch08.pptx
 
DC16_Ch06.pptx
DC16_Ch06.pptxDC16_Ch06.pptx
DC16_Ch06.pptx
 
DC16_Ch05.pptx
DC16_Ch05.pptxDC16_Ch05.pptx
DC16_Ch05.pptx
 
DC16_Ch03.pptx
DC16_Ch03.pptxDC16_Ch03.pptx
DC16_Ch03.pptx
 
DC16_Ch02.pptx
DC16_Ch02.pptxDC16_Ch02.pptx
DC16_Ch02.pptx
 
DC16_Ch01.pptx
DC16_Ch01.pptxDC16_Ch01.pptx
DC16_Ch01.pptx
 
4 Expanding on PowerPoint Basics.ppt
4 Expanding on PowerPoint Basics.ppt4 Expanding on PowerPoint Basics.ppt
4 Expanding on PowerPoint Basics.ppt
 
3 Working with Visual Elements.ppt
3 Working with Visual Elements.ppt3 Working with Visual Elements.ppt
3 Working with Visual Elements.ppt
 
2 Creating and Enhancing PowerPoint Presentations.ppt
2 Creating and Enhancing PowerPoint Presentations.ppt2 Creating and Enhancing PowerPoint Presentations.ppt
2 Creating and Enhancing PowerPoint Presentations.ppt
 
1 Microsoft PowerPoint Basics.ppt
1 Microsoft PowerPoint Basics.ppt1 Microsoft PowerPoint Basics.ppt
1 Microsoft PowerPoint Basics.ppt
 
Chapter 7 - Systems Life Cycle.pptx
Chapter 7 - Systems Life Cycle.pptxChapter 7 - Systems Life Cycle.pptx
Chapter 7 - Systems Life Cycle.pptx
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Chapter 8 - Safety and Security.pptx

  • 1. ICT IGCSE Theory – Revision Presentation 2015 – 2016 Questions (New Syllabus) Chapter 8 - Safety and Security Describe four strategies that you could use to minimise the dangers of using social networking sites to make new friends. • Know how to block and report unwanted users, • Never arrange to meet anyone alone • Always tell an adult first when arranging to meet someone • Always meet in a public place • Avoid inappropriate disclosure of personal data/set privacy settings/Avoid giving email address or phone number when chatting • Avoid inappropriate disclosure of your own name/Avoid giving your full name • Avoid giving your address • Avoid giving your school name or displaying a picture in school uniform • Do not display pictures taken at home/Do not display pictures taken of the school with the name attached/Do not send pictures/videos of yourself to strangers • Ensure that the person you are befriending has very secure privacy settings • Check profiles before contacting people • Verify person’s contact details with other trusted people/friends
  • 2. ICT IGCSE Theory – Revision Presentation 2015 – 2016 Questions (New Syllabus) Chapter 8 - Safety and Security Explain why encryption is needed when transmitting data. • To cause data to be scrambled/encoded • Protects sensitive data… • …from being understood if it falls in to the wrong hands • Only user/computer with key can understand data There are many safety issues associated with the use of computers. Describe three of these issues. • Electrocution by touching loose/bare wires/spilling liquids on electrical contacts • Tripping and falling over trailing wires or cables • Physical injury to feet/legs, etc. caused by heavy equipment falling • Fire caused by too many plugs in multisocket and thereby overheating/overheating of equipment
  • 3. ICT IGCSE Theory – Revision Presentation 2015 – 2016 Questions (New Syllabus) Chapter 8 - Safety and Security There are many health issues associated with the use of computers. Name three of these health issues and for each one describe, in detail, a different cause. • Headaches/eyestrain • From staring at screen continuously • RSI in fingers • From continual typing/repetitive clicking of mouse • RSI in wrists • From repetitive clicking of mouse/continual typing • Backache • From sitting in same position all day
  • 4. ICT IGCSE Theory – Revision Presentation 2015 – 2016 Questions (New Syllabus) Chapter 8 - Safety and Security • The action of sending emails to fraudulently obtain another person’s bank details is called Phishing • The action of illegally installing malicious code which redirects a person to a fraudulent website with the purpose of obtaining that person’s bank details is called Pharming • Unsolicited bulk emails are called Spam • The action of sending text messages to fraudulently obtain another person’s bank details is called Smishing • An internet protocol for delivering private messages using cryptography is called https/SSL/TLS • An attachment to an electronic message used to verify the identity of the sender is called a digital certificate
  • 5. ICT IGCSE Theory – Revision Presentation 2015 – 2016 Questions (New Syllabus) Chapter 8 - Safety and Security Describe four methods you could use to minimise the likelihood of receiving spam emails. • Use a spam filter/anti-spam software • Do not reply to spam/suspicious messages • Do not click on any links/attachments in a spam/suspicious message • Use a disposable email address • Use a complex email user name • Do not give out your email address online/do not register using email on untrusted websites/opt • out of marketing • Read messages as text • Do not use your email address as an online username • Changing to an email provider who filter spam