Chapter 8 Flashcards

Flash cards to study chapter 8

1
Q

What is electrocution ?

A

ICT devices require electrical power to charge or run
The electrical device can cause electrocution
Electrocution is caused by the electric current moving through your body, it can cause severe injury or death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the causes of electrocution and how to prevent it ?

A

1- Spilling drinks near electrical equipment
htp:-
Keep liquids away from electrical equipment

2- Touching live cables
htp:-
Ensure that cables are properly insulated and protected

Use non-conductive materials where possible

Ensure that electrical equipment is turned off and unplugged before cleaning or maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is fire problem

A

ICT devices require electricity to charge or run
Too many devices using a single socket can cause the plug socket to overload
Heat is generated by too much electricity, causing the wiring to degrade and ignite a fire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

causes of fire and htp

A

1- Sockets being overloaded
htp:-
ensure enough plug sockets in the room

Don’t plug too many devices into the same plug socket

Don’t leave devices plugged in and unattended

2- Equipment overheating
htp:-
Keep flammable materials away from heat sources

Regularly check equipment for signs of wear or damage

Use fire extinguishers in case of emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is trailing over cables ?

A

Devices can be plugged in using cables, cables that are protruding can cause an accident
You can trip over a cable left out in a location
Body damage can occur during a fall, for example, breaking bones, ligament damage, bruising, sprains etc depending on the area fell on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

causes and htp of trailing over cables

A

1- Cables not properly secured or organised
htp:-
Keep cables away from areas where people are walking

Secure cables where you can, like under desks to stop protruding into open areas

Use cable covers to protect cables and prevent tripping hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is heavy equipment falling ?

A

Devices have varying levels of weight and if a device falls on you it could cause injury
Any device should be placed in a secure location, like a PC on a strong desk and not near the edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

causes and htp of equipment falling

A

1- Improperly secured equipment
htp:-
Ensure that equipment is properly secured and stable

Regularly check the stability of locations containing devices

2- Equipment not placed on stable surfaces
htp:-
Keep equipment away from edges and other potential hazards

Regularly inspect equipment and locations containing devices for signs of wear or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Principles of the Data Protection Act

A

Data must be processed lawfully, fairly, and transparently, with clear consent from the individual
Data should only be collected for specific, explicit, and legitimate purposes
Organisations should only collect and retain the minimum amount of personal data necessary for their stated purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is Data Protection Legislation Required?

A

Protecting Individual Rights: Data protection legislation safeguards individuals’ right to privacy and control over their personal information
Preventing Misuse of Personal Data: It helps prevent unauthorised access, identity theft, fraud, and other forms of data misuse
Promoting Trust: Data protection laws build trust between individuals and organisations by ensuring their personal information is handled responsibly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is personal and sensitive data ?

A

information that can be used to identify an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ex of personal data

A

personal name
address
date of birth
gender
personal image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ex of sensitive data

A

political views
religion
racial origin
biometric data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why should personal data be secured ?

A

Inappropriate disclosure of personal data can lead to privacy breaches, identity theft, or misuse of the information
Personal data could be sold to third party companies
Individuals could be held to ransom over personal data gathered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is e-safety

A

E-safety is about knowing about and using the internet safely and responsibly
It refers to when an individual is using the internet, email, social media, online gaming
E-safety refers to the individual knowing how to protect themselves from potential dangers and threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

needs of e- safety

A

Protects personal information
awareness that personal information should not be shared freely
Prevents cyberbullying
awareness of how to act online and how to avoid falling victim, creating a safe and respectful online environment.
Guards against online scams
identify and avoid online scams, phishing attempts, and fraudulent websites that may try to trick them into sharing personal or financial information.
Promotes privacy and control
have control over privacy settings on social media platforms, allowing a limit to who can access/view personal information and posts.

17
Q

advices of e-safety in internet

A

Use trusted websites recommended by teachers or reputable sources
Utilise search engines that only allow access to age-appropriate websites and use filters to ensure inappropriate content is not seen
Never reveal personal information

18
Q

advices of e-safety in email

A

Be aware of the potential dangers of opening or replying to emails from unknown people, including attachments, potential dangers include phishing, spam
Ensure you know who the email is for when considering sending personal data or images via email, only with people you know and not with identifiable content like school photos

19
Q

advices of e-safety in social media

A

Know how to block and report people who send content or messages that are unwanted
Know where the privacy settings are to reduce the number of people who can see your posts or images
Be aware of the potential dangers associated with meeting online contacts face to face, do not meet anyone you do not know, if you do, take an adult and meet publicly
Do not distribute of inappropriate images and inappropriate language
Respect the confidentiality of personal data belonging to other people
Only accept friend requests from people you know

20
Q

advices of e-safety in gaming

A

Do not use real names as usernames
Never share personal or financial details with other players
Know how to block and report players for inappropriate messages or comments

21
Q

What are threats to data ?

A

Hacking: Unauthorised access to computer systems or networks to gain control, steal information, or cause damage
Phishing: Deceptive emails or messages that appear to be from trusted sources to trick individuals into revealing personal data
Pharming: Manipulation of DNS (Domain Name System) to redirect users to fraudulent websites, often for the purpose of stealing personal data
Smishing: Phishing attacks carried out through SMS or text messages
Vishing: Phishing attacks carried out through voice calls or VoIP (Voice over Internet Protocol) systems
Viruses and malware: Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems or networks
Card fraud: Unauthorised use of credit or debit card information for fraudulent purposes

22
Q

how to protect from hacking

A

Implement strong and unique passwords for accounts and regularly change them
Enable two-factor authentication for additional security
Regularly update software and operating systems to patch security vulnerabilities
Use firewalls and antivirus software to detect and prevent unauthorised access
Regularly backup data to ensure its availability and protection against potential data loss

23
Q

Protection from phishing, pharming, smishing, and vishing attacks

A

Being cautious of unsolicited emails, messages, or calls requesting personal or sensitive information
Verifying the authenticity of websites by checking for secure connections (HTTPS) and looking for trust indicators, such as SSL certificates
Avoiding clicking on suspicious links or downloading attachments from unknown sources
If you are unsure, end communication and establish contact with company or contact to check legitimacy

24
Q

Protection from viruses and malware

A

Install antivirus software and keep it up to date
Download files only from trusted sources and scan them for viruses before opening or executing them
Do not visit suspicious websites or click on pop-up ads
Regularly update software, including web browsers and plugins, to patch security vulnerabilities

25
Q

Protection from card fraud

A

Shielding PIN entry at ATMs or payment terminals to prevent shoulder surfing
Being cautious when using payment cards online, ensuring secure and trusted websites are used
Regularly monitoring bank statements and reporting any suspicious transactions
Using secure payment methods, such as chip and PIN or contactless payments, where available
Being aware of potential skimming devices on ATMs and payment terminals and reporting any suspicious activity

26
Q

What is biometrics ?

A

The use of unique physical or behavioural characteristics of individuals, such as fingerprints, facial recognition, or iris scans, for authentication and access control
Biometric data provides a more secure method of identification as it is difficult to forge or replicate

27
Q

adv and dis of biometrics

A

adv:-
Harder to crack
Easier to use for individual
High accuracy
dis:-
Skin damage can stop identification
Facial features can change over time
Some biometrics are more expensive to set up than others
Voice recognition can be affected by illness

28
Q

What is digital certificate

A

An electronic document that verifies the authenticity and integrity of a website
The purpose of a digital certificate is to establish trust between parties and ensure secure communication
Contents of a digital certificate typically include the entity’s public key, identification information, and the digital signature of a trusted third party

29
Q

What is SSL

A

A protocol that establishes an encrypted link between a server and a client computer
SSL ensures that data transmitted between the server and client remain confidential and cannot be intercepted or adjusted by unauthorised individuals
Identified on a website by the S at the end of HTTP

30
Q

What is encryption ?

A

The process of converting data into a form that is unreadable without a decryption key
Encryption is used to protect data on hard disks, email communications, cloud storage, and secure websites (HTTPS)
It ensures that even if data is accessed by unauthorised individuals, it cannot be understood without a decryption key

31
Q

What is firewall ?

A

A network security device that monitors and controls incoming and outgoing network traffic
The purpose of a firewall is to create a barrier between an internal network and external networks, filtering traffic based on predefined rules
It helps prevent unauthorised access, malware, and other network threats

32
Q

adv and dis of firewall ?

A

adv:-
Stops attacks from device
Stops fraudulent sites attacking the device
dis:-
Can affect the operation of the computer and some uploads
To upload some files, the firewall may need to be switched off, leaving the computer open to attacks
Can stop legitimate software from running

33
Q

What is two factors authentication

A

A security measure that requires users to provide two separate forms of identification to verify their identity
The purpose of 2FA is to add an extra layer of security beyond just a username and password
It usually involves a combination of something the user knows (password), something the user has (smartphone or token), or something the user is (biometric data)

34
Q

What is user ID and password

A

A common method of authentication that involves a unique identifier (user ID) and a secret code (password)
User ID and password are used to increase the security of data by allowing access only to authorised individuals
Strong passwords and regular password changes are important to maintain security
It is recommended to use a combination of uppercase and lowercase letters, numbers, and special characters in passwords

35
Q

adv and dis of user ID and password

A

adv:-
Strong passwords are difficult to crack
Regularly changing passwords increases the security
Using a range of passwords over the system will stop or slow access to the full system
dis:-
Passwords too complex can be harder to remember
Too many passwords are hard to remember
Harder to choose unique passwords if regularly updating
Harder to remember if regularly updating
Hackers can break most passwords