8. Safety and security Flashcards

1
Q

What is physical safety?

A

All about ensuring that you do not suffer any harm whilst working with computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of physical safety issues

A

Electrocution
Fire
Tripping over wires
Heavy equipment falling on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electrocution

A

Harm, or even death caused by an electric current passing through the body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Causes of electrocution

A

Faulty equipment
Spilling drinks over electrical equipment
Opening up an electrical device and messing with the hardware inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevention of electrocution

A

Make sure wires and insulated
Keep drinks away from equipment
Report any malfunctioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Causes of fires

A

Too many devices plugged into a single mains outlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prevention of fires

A

Plenty of main outlets
Don’t plug too many devices in the same outlet
Turn off and unplug devices of away for a long time
Fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Causes of tripping over wires

A

Long wires or cables trailing across a floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prevention of tripping over wires

A

Encase the wires
Tuck under carpets or desks
Use wireless technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Causes of heavy equipment falling

A

Not positioned securely onto desks

Poor quality and flimsy desks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevention of falling equipment

A

Make sure that equipment is positioned away from the edge of desks
Plenty of space on the table
Strong desks/tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Potential dangers of the Internet

A

Cyber predators
Cyber bullies
Data theft
Adult content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is personal data?

A

Anything that can be used to identify a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of personal data

A

Name
Address
Phone number
Photograph
Bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should you keep personal data private?

A

Prevent identity theft
Prevent theft of your money
Prevent burglary of your home
Prevent physical harm to yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is e-safety?

A

Knowing how to use the Internet safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to use the Internet safely?

A

Never reveal personal info
Only use websites recommended by teachers or parents
Only open emails from people you know
Know how to block people on social media and in chat rooms
Never post or email pictures of yourself in school uniform
Report unwanted users
Use the privacy controls on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Precautions when playing games online

A

Never reveal personal info
Use a nickname as your game name
Play online games that use anti-virus software
Know how to block people in the game
Report unwanted users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is hacking?

A

Where people gain unauthorised access to computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a key logger?

A

A special type of software that is secretly sent to a computer system and then ‘logs’ every key press that user of the system make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do people try to hack into computer systems?

A

Cause damage to files or data by deleting or changing them
Commit fraud by stealing data
Access sensitive information
See if they are clever enough to beat the system’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Effects of hacking

A

Identity theft
Theft of money
Stealing of customer information
Stealing email addresses
Loss of important information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is ‘authentication’?

A

Check that a person accessing a computer system or a network is allowed to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

User-IDs and passwords

A

If the correct user enters the correct password, they would be given access to the computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

User-IDs

A

are unique and identifies particular users as they log onto a computer system or a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Passwords

A

a combination of letters, numbers and symbols and should only be known by the user who owns it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How to use a password effectively

A

change your password often
keep your password secret
don’t write your password down anywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Biometric authorisation

A

users are authenticated using one of their body parts
e.g. face scans
iris scans
fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Advantages of using biometric authentication

A

passwords can be forgotten, while body parts aren’t

not possible to forge body parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Disadvantages of using biometric authentication

A

high initial costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How to protect data online?

A

Digital certificates

Secure socket layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are digital certificates?

A

attached to emails and websites in order to prove who has sent the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does the digital certificate consist of?

A

Sender’s email address
Name of the sender
A serial number
Certificate expiry date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a secure socket layer?

A

used on websites where we use bank or credit card details in order to make purchases
e.g. httpS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How does a SSL work?

A

encrypts the connection between your computer and the e-commerce website and ensure that all transactions are secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is ‘phishing’?

A

when fraudsters try and ‘bait’ users into giving up our bank details, credit card info, usernames and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Where does phishing usually happen?

A

usually carried out over emails pretending to be from legitimate organisations like banks and building societies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How to protect yourself against phishing?

A

never give out bank details and passwords over email
phishing sometimes promise you enormous wealth -> ignore them
report any phishing attempts to your email account provider
don’t respond to emails from people you do not know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is ‘pharming’?

A

obtain personal information such as usernames, passwords and bank details but target shopping and banking websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How is pharming done?

A

infect legitimate websites with malicious code that will re-direct you to their bogus version of the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How to protect yourself against pharming?

A
  1. check the URL of the website
  2. make sure you are on a secure website (https)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is ‘smishing’?

A

SMS phishing - phishing through text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How to protect yourself against smishing?

A

never give your bank details or passwords out over phone or text message
ignore text messages from people you don’t know
report any phishing attempts to your mobile phone company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is ‘spam’?

A

‘junk email’ or ‘bulk email’ sent automatically to thousands, or even millions of email inboxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Why do people send spam?

A

attempt to gain people’s personal data (like bank info) through phishing
advertise low quality products
spread viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How do spammer get your email address?

A

mailing lists
social networking sites
chat rooms
programs that automatically trawl through websites looking for and collecting email addresses
bought illegally from dishonest employees of a busines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How to recognise spam email?

A

strange sender
you are asked to buy something or send cash
asked to send passwords, bank details or other personal information
email is full of spelling or grammar errors
asked to carry out a task immediately
asked to click a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How to prevent spam?

A

use spam filters

don’t post your email address in public websites like chat rooms or social networking sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is encryption?

A

scrambing data into garbled code using an encryption key, so even if data is stolen, it cannot be understood by the thief

50
Q

Process of encrypting a file

A

create an encryption key
give the receiver a copy of the encryption key
encrypt the personal message using encryption software and the encryption key. once encrypted, the message will just look like scrambled nonsense
send the encrypted message to the receiver via the internet
the receiver gets the message and decrypts it by the encryption key

51
Q

When should you get encryption?

A

files containing bank account or credit card data
buying items on the internet using credit/bank cards
any data containing confidential medial records
emails you wish to remain private
any data that can be used to commit identity fraud

52
Q

Moderated forums

A

where all user comments are checked by an administrator before they are posted onto the forum

53
Q

Un-moderated forum

A

used for online discussions but they do not have administrators or moderators

54
Q

The security of moderated and un-moderated forums

A

Moderated:
no racist or offensive content
no swearing
less chance of being exposed to spam
personal data is more secure

Un-moderated:
high chance of being exposed to racist/offensive content
swear words
spam adverts
greater risks of phishing

55
Q

Computer virus

A

programs that automatically make copies of themselves and then attach to other files within the computer

56
Q

Effects of computer virus

A

pop-up messages on the screen
computer slows down and crashes a lot
delete important files or data
access personal data like passwords, bank details or credit card numbers

57
Q

How do viruses infect computers?

A

download infected files from the internet
email attachments
portable storage media

58
Q

How to prevent virus infection?

A

use up-to-date anti-virus software
use genuine copies of software
only open email attachments from people you trust
download software from legitimate websites

59
Q

Security risks of storing data in the cloud

A

have no control over the physical security of the data
online storage company might go out of business
hackers
back-ups of data

60
Q

What is a ‘firewall’?

A

a program or hardware device that filters the data packets coming through the internet connection into your computer. [network]

61
Q

Why are firewalls used?

A

protect your system from hackers, keyloggers, cyber threats

62
Q

VIRUS

A
  • malicious code that infects a computer
    attaches itself to files
    replicate itself
    🏃 causes computer to shut down/crash
    🏃 causes computer to slow down
    🏃 files up computer memory
    🏃 delete/corrupte data
    🏃 corrupt/ erase content of hard disk
63
Q

Impact of VIRUS

A

🏃 causes computer to shut down/crash
🏃 causes computer to slow down
🏃 files up computer memory
🏃 delte/corrupte data

64
Q

what is a virus

A

malicious code that infects a computer
attaches itself to files
replicate itself

65
Q

List the health risks posed by computer systems.

A

Back and neck problems/ strain
RSI (Repetitive strain injury)
Eyestrain
Headache
Ozone irritation

66
Q

What causes back and neck problems and how can they be reduced?

A

Caused by sitting in front of computer for a long time
* Use adjustable ergonomic chairs and workstation
*Maintain correct posture and use footrests
*Use screens that can be tilted so neck is at the right angle

67
Q

What causes RSI and how can it be reduced?

A

It is the damage to finger and wrists caused by continuous use of mouse or keyboard.
* Take regular breaks and do exercise
* Use voice-activated software wherever possible
* Use ergonomic devices
* Use wrist rest
* Maintain correct posture of arms

68
Q

What causes eyestrain and how can it be reduced?

A

Caused by staring at a screen for too long or incorrect lighting.
* Change from CRT to LCD so there is less flickering
* Use antiglare screens
* Use window blinds to reduce sunlight entering
* Get regular eye check-ups or use glasses
* Take regular breaks

69
Q

What causes headache and how can it be reduced?

A

Caused by incorrect lighting, flickering screens and screen reflections.
* Use LCD screens
* Use anti-glare screens
* Take regular breaks
* Test your eyes

70
Q

What causes ozone irritation and how can it be reduced?

A

Caused by laser printers (dry skin and respiratory problems).
* Use a separate room for printers
* Switch to inkjet printers
* Have proper ventilation in the office

71
Q

List the safety risks posed by computers.

A

Trailing wires (trip hazard)
Electrocution
Fire hazard
Heavy equipment falling and causing injury

72
Q

List ways of reducing risk of electrocution.

A

Check equipment regularly
Don’t bring drinks/ fluids near computers
Use an RCB (residual current breaker)
Insulate wires

73
Q

List ways of reducing risk of tripping over trailing wires.

A

Tuck away wires and cover them
Use wireless wherever possible
Use cable ducts

74
Q

List ways of reducing risk of injury by heavy equipment.

A

Use strong desks and supports
Use large desks
Don’t place equipment near edge as they could fall

75
Q

List ways of reducing risk of fires.

A
  • Check equipment regularly
  • Don’t overload sockets with too many items
  • Have a CO2 extinguisher in the office
  • Ensure there is good ventilation to prevent
    overheating
  • Don’t cover equipment or any vents
    *Use low voltage hardware (LCD instead of CRT)
76
Q

What are few precautions home users can take to prevent health and safety risks?

A
  • Don’t bring drinks near electronic equipment
  • Fix wires or tuck them away to prevent chance of people coming in contact with wires
  • Don’t cover computers with cloth, etc as that can block vents
  • Don’t plug too many devices into sockets
    Exercise and take regular breaks
  • Use ergonomic workstations
77
Q

What is personal data?

A

Data concerning a living person who can be identified directly from the data itself or by a data conjunction.

78
Q

Examples of personal data.

A

Name
Address
DOB
Medical history
Banking details

79
Q

Examples of sensitive personal data.

A

Ethnic origin
Sexual orientation
Criminal activity
Religion
Political views

80
Q

List the Dos and Donts of e-safety.

A

Don’t give out personal information to unknown people
Don’t share pictures of yourself with other people
Always maintain your privacy settings
Use only trusted websites (padlock symbol or HTTPS)
Open emails from known sources only
Use and ISP that has an effective email filtering feature

81
Q

List the Dos and Donts of social networking sites.

A

Block or report anyone who acts suspiciously or inappropriately
Use appropriate language
Always use nock names ( never reveal your real name)
Don’t share personal data
Never enter private chat rooms, stay public
Don’t meet anyone alone on the first time and tell someone before meeting
Avoid the misuse of images
Respect people’s confidentiality
Use a private account

82
Q

Risks of online gaming.

A

Predators who attack vulnerable people
Misuse of webcams and other video-related threats
Use of voice-masking technology
Violence in the game can lead to violence in real life
Cyberbullying
Cyber attacks like viruses, phishing or spyware.

83
Q

List the security risks associated with any device that connects to a network.

A

Hacking
Phishing
Vishing
Smishing
Pharming
Spyware
Viruses
Spam

84
Q

Hacking

A

Act of gaining unauthorized access to a computer system.
Can lead to identity theft, misuse of personal data.
Data can be deleted, corrupted or changed.
Use a firewall
Use IDs and strong passwords and frequently change them
Use intrusion detection software.

85
Q

Cracking

A

Editing a source code of a program for a malicious purpose like sending a user to a fake website.

86
Q

What is phishing?

A

A recipient receives a legitimate-looking email from a seemingly trustable source. The email has links that redirect them to a fake website where they are asked to enter personal data which is then stolen.

87
Q

Threats and methods of preventing phishing.

A
  • People can gain your personal data (bank account data, etc)
  • Identity theft and fraud
    PREVENTION:
  • Use an ISP that has an effective phishing email filter feature
  • Be careful while opening mails and attachments
  • Don’t click on attachments that end in:
    .exe , .bat , .com or .php
88
Q

Smishing

A
  • Recipients recieve legitimate SMSs from seemingly trustable sources that contain a URL or telephone number. They are asked to open the website or call the number and are asked to give personal data that is then stolen and misused.
89
Q

Vishing

A

Recipients receive legitimate-sounding voicemails from seemingly trustable sources that trick the user into calling a telephone number where they are asked to give personal data that is stolen and misused.

90
Q

Recipients receive legitimate-sounding voicemails from seemingly trustable sources that trick the user into calling a telephone number where they are asked to give personal data that is stolen and misused.

A

A malicious code is installed on a user’s computer which redirects them to a fake website where data is stolen.
* Identity theft, fraud and misuse of gained personal data
* Use anti-spyware to identify and remove any pharming codes
* Look for clues that you are being redirected to a fake website- Check for padlock symbol or HTTPS

91
Q

Spyware and key-logging software

A

Software that monitors the key presses on a user’s keyboard and sends compiled data back to the person who sent the software.
* Data typed in is stolen (passwords, etc)
* Software can change the user’s default browser settings and read cookie data
* Use and regularly update anti-spyware software
* Enter passwords with pointing device and use dropdown options
* Use OTPs

92
Q

Viruses

A

A program code or software that replicates itself with the intention of deleting or corrupting files on a computer to cause malfunction.
* Fills up hard drive with data and computer crashes
* Can delete/ corrupt files
* Can corrupt OS files and make the comp run slowly and crash
* Use anti-virus software and update it.
* Don’t use software or open emails from unknown sources

93
Q

Spam

A

Junk emails that a recipient on a mailing list/ group receive. Spam clogs up bandwidth and this leads to denial of services. It floods the network with useless traffic. It can be linked to phishing or virus attacks.
* Use an ISP that can filter out spam email
* Junk email filter
* Block images in HTML massages that spammers use as web beacons
* Untick already selected check boxes for email lists
* Don’t sign up to mailing lists
* Unsubscribe from mailing lists

94
Q

What is a web beacon?

A

A graphic image in a website/ webserver that can be used to verify email addresses when the image is opened.

95
Q

What is a moderated forum?

A

An online discussion forum in which all posts are checked by an administrator before they are allowed to be posted. An administrator can filter inappropriate and irrelevant posts and prevent spam.

96
Q

Cookies

A

Small files/ code that is stored on the user’s computer
Stores small lookup table with values
Webserver reads this table and customizes web pages

97
Q

List ways of additional security of data online.

A

Firewalls
Authentication
Encryption
Security protocols

98
Q

What is a firewall?

A

Hardware or software that sits between a user’s computer and an external network (like the internet).

99
Q

What is the data protection act? When was it set up?

A

The data protection act was set up in 1998 and is a set of rules for people or organisations that store data must follow.

100
Q

What is the purpose of the data protection act?

A

Its purpose is to protect the privacy of the individual so that information cannot be given or sold to businesses without the individual’s consent. It gives the individual right to check the data.

101
Q

What are the 8 principles of the act? (1-2)

A

Data must be obtained and kept within the law. The data controller must be registered with the data commissioner and must ask the data subject for permission for the data to be used.
The data controller must only use the data for the purpose he has permission for.

102
Q

What are the 8 principles of the act? (3-5)

A

The data must be relevant and not excessive; the data controller must not collect more than is necessary.
The data must be accurate and kept up to date
The data should not be kept for longer than necessary.

103
Q

What are the 8 principles of the act? (6-8)

A

The data subject must be allowed to look at the data and it must be kept in accordance to his rights
The data must be kept securely so that only those who are allowed to access it do so
Data can only be used within the European Union unless another country has similar data protection laws to the EU’s

104
Q

What is a loyalty card?

A

A loyalty card is a card that customers sign up for to collect deals and promotions from being a repeat customer e.g. Tesco clubcard

105
Q

Who uses loyalty cards?

A

The customer uses the loyalty card by showing it with each purchase and therefore gets discounts. The store uses the information to send specific promotions and deals to those depending on their spending e.g. constant nappy purchases suggests they have a child

106
Q

How can you store data securely?

A

You can by using….

Passwords
Firewalls
Screen savers
Encryption
Virus Protection

107
Q

What is a data controller?

A

A data controller is the person who holds the information about others

108
Q

What is a data subject?

A

A data subject is the person who’s information is being collected and used by the controller

109
Q

What is a firewall?

A

A firewall is a software function that allows or denies people access who is attempting to access the system based on a set of rules.

110
Q

What is the purpose of a firewall?

A

The purpose is to prevent or delay access to the internal network of a computer. The software checks data and IP (internet provider) addresses and can prevent access by viruses, malware (harmful software) and the wrong sort of downloads/ uploads.

111
Q

What is a secure password?

A

A secure password uses a range of characters and numbers and punctuation e.g. Hj8-olX. This lowers the risk of infiltration. Specific data can be set passwords to be seen or altered.

112
Q

What is a screen saver?

A

A screen saver is a type of computer programme that prevents damage to computer monitors by blanking the screen. On their own, screen savers don’t make data secure, they need a password to. But it stops people seeing private files.

113
Q

What is encryption?

A

Means putting data into a secret code. Sensitive data can be put in code to prevent theft. You would need to purchase specialist software that uses an algorithm which is a set of rules to decrypt the information

114
Q

What is virus protection?

A

a program that prevents you from getting virus, and destroys the ones you have on your system

115
Q

Threats from data protection could be…

A

Hackers
Viruses
Hardware Breakdown
Human Error

116
Q

Actions that can help to secure data include the following…

A

Every authorised user should have a password]
Use biometrics
Use different levels of security
Set the access rights to files
Encrypt the data
A firewall
Use antivirus software
Backup data regularly

117
Q

What does the DPA do?

A

It limits the data held by individual organisations to only that which they need. It stops them holding excessive quantities of data on individuals that they don’t need.

118
Q

Describe personal data.

A

Any data which relates to a living, identifiable individual.

119
Q

Describe data. (DPA)

A

Anything that is held which can be said to be part of a record. This covers both manual and computer data. If you store data on people, such as their health or educational records, whether it is on paper or on a computer, it is data.

120
Q

Describe processing. (DPA)

A

Obtaining, recording or holding the information or data. It also covers any operation performed on it.

121
Q

Obtaining, recording or holding the information or data. It also covers any operation performed on it.

A

Operations include organising, changing retrieving it or using it in some way. This also includes disclosing it or destroying it.