Issues Flashcards
(34 cards)
How can you stop hackers, phishing and viruses
You can keep your Bluetooth switched off when not in use to stop viruses.
To stop packages you can use firewalls, passwords and can encrypt the information travelling across networks.
You need to be able to identify phishing
Hannah switches off Bluetooth on her phone when not using it. Explain how this improve security
Other uses with Bluetooth devices her within range cannot connect with her device and send unwanted messages to her
John is worried about data security state two ways you can protect his data when using a smart phone
Set a pin/password,
Encrypt data
In the UK what protects our privacy online
The data protection act
Name two threats to our privacy online
Identity theft involve someone pretending to be another person I collecting information about their identity.
Cookies can help advertising relativement products but may be seen as a privacy issue.
How can you stop identity theft and cookies from violating your privacy
You can keep all your personal information safe to stop identity theft. You need to know how to delete a manager cookies
How was privacy achieved
Keeping your personal information safe,
Organisations you give your personal information to giving your information safe
Explain one way of preventing unauthorised users from reading data in a database
It can be encrypted so that it could only be read by people with the encryption key
Some criminals steal personal information from Internet users. List two methods that criminals could use to collect personal information online
Spyware, hacking
Name three security issues for digital devices
Hackers trying to get access to data without permission.
Viruses I designed to be harmful to destroy devices and to spread easily over networks.
Phishing cons people into believing that an email/text is from a valid organisation so they give away their username and password leading to identify theft.
Name three ways of monitoring people using ICT
Geo location information from GPS enabled devices which can track your position.
Your computers IP address provides clues to search engines about your geological location.
Explain how the irresponsible use of GPS data could play social network users at risk
GPS data gives away the users location. This could be dangerous if someone wanted to cause harm to that person as I could go and find them
State two ways in which people may track your communications
Emails,
Social networking
State three positive effects that ICT can have another physical and mental health
Friendships can be built online using social networking.
We can learn new things as information can be accessed easily.
Exercises at home using games such as the wii can improve physical fitness
Name three negative effects ICT can have an office are cool and mental health
Can contribute to obesity due to inactivity.
Eye strains come because by staring at the screen for a long time.
Accident him because by people using mobile phones whilst driving
Repetitive strain injury is associated with playing video games. Speak to you is Mark can prevent the repetitive strain injury and playing games.
Take regular breaks.
Use ergonomically designed equipment.
describe how networks have affected the way people work
People can now work from home using teleworking. People can work easily with people all around the world. The location of an office is now less important.
Describe how networks have affected communication
You can socialise with people all around the world 24/7.
There is no rapid spread of news.
People over using social networking sites.
Describe how networks have affected creativity
People can become content generators for websites e.g. YouTube
Describe how networks have affected shopping
We have rapid access,
Round-the-clock availability,
No need to leave the house
Describe two ways in which networks have an impact on society
Allow people to work from home but communicate easily with other people in offices and all over the world using email and VoIP.
The impact how we buy things we no longer need to leave our home is to go shopping we can buy things on the Internet.
What is the data protection act
It is an act that protects us against misuse of a personal data that may be held by a range of organisations.
What is the computer misuse act
It is on at that covers the misuse of computer equipment and the legal access to files. This makes the following a legal: software piracy, hacking and Fraud
What is the copyright, designs and patents act
It is an act that makes it a criminal fence to copy all still media or other peoples work or ideas