Section 8 - Safety and security Flashcards

(61 cards)

1
Q

What is physical safety?

A

All about ensuring that you do not suffer any harm whilst working with computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of physical safety issues

A

Electrocution
Fire
Tripping over wires
Heavy equipment falling on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electrocution

A

Harm, or even death caused by an electric current passing through the body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Causes of electrocution

A

Faulty equipment
Spilling drinks over electrical equipment
Opening up an electrical device and messing with the hardware inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevention of electrocution

A

Make sure wires and insulated
Keep drinks away from equipment
Report any malfunctioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Causes of fires

A

Too many devices plugged into a single mains outlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prevention of fires

A

Plenty of main outlets
Don’t plug too many devices in the same outlet
Turn off and unplug devices of away for a long time
Fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Causes of tripping over wires

A

Long wires or cables trailing across a floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prevention of tripping over wires

A

Encase the wires
Tuck under carpets or desks
Use wireless technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Causes of heavy equipment falling

A

Not positioned securely onto desks

Poor quality and flimsy desks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevention of falling equipment

A

Make sure that equipment is positioned away from the edge of desks
Plenty of space on the table
Strong desks/tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Potential dangers of the Internet

A

Cyber predators
Cyber bullies
Data theft
Adult content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is personal data?

A

Anything that can be used to identify a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of personal data

A
Name
Address
Phone number
Photograph
Bank details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should you keep personal data private?

A

Prevent identity theft
Prevent theft of your money
Prevent burglary of your home
Prevent physical harm to yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is e-safety?

A

Knowing how to use the Internet safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to use the Internet safely?

A

Never reveal personal info
Only use websites recommended by teachers or parents
Only open emails from people you know
Know how to block people on social media and in chat rooms
Never post or email pictures of yourself in school uniform
Report unwanted users
Use the privacy controls on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Precautions when playing games online

A
Never reveal personal info
Use a nickname as your game name
Play online games that use anti-virus software
Know how to block people in the game
Report unwanted users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is hacking?

A

Where people gain unauthorised access to computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a key logger?

A

A special type of software that is secretly sent to a computer system and then ‘logs’ every key press that user of the system make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do people try to hack into computer systems?

A

Cause damage to files or data by deleting or changing them
Commit fraud by stealing data
Access sensitive information
See if they are clever enough to beat the system’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Effects of hacking

A
Identity theft
Theft of money
Stealing of customer information
Stealing email addresses
Loss of important information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is ‘authentication’?

A

Check that a person accessing a computer system or a network is allowed to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

User-IDs and passwords

A

If the correct user enters the correct password, they would be given access to the computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
User-IDs
are unique and identifies particular users as they log onto a computer system or a network
26
Passwords
a combination of letters, numbers and symbols and should only be known by the user who owns it
27
How to use a password effectively
change your password often keep your password secret don't write your password down anywhere
28
Biometric authorisation
users are authenticated using one of their body parts e.g. face scans iris scans fingerprint
29
Advantages of using biometric authentication
passwords can be forgotten, while body parts aren't | not possible to forge body parts
30
Disadvantages of using biometric authentication
high initial costs
31
How to protect data online?
Digital certificates | Secure socket layer (SSL)
32
What are digital certificates?
attached to emails and websites in order to prove who has sent the message
33
What does the digital certificate consist of?
Sender's email address Name of the sender A serial number Certificate expiry date
34
What is a secure socket layer?
used on websites where we use bank or credit card details in order to make purchases e.g. httpS
35
How does a SSL work?
encrypts the connection between your computer and the e-commerce website and ensure that all transactions are secure
36
What is 'phishing'?
when fraudsters try and 'bait' users into giving up our bank details, credit card info, usernames and passwords
37
Where does phishing usually happen?
usually carried out over emails pretending to be from legitimate organisations like banks and building societies
38
How to protect yourself against phishing?
1. never give out bank details and passwords over email 2. phishing sometimes promise you enormous wealth -> ignore them 3. report any phishing attempts to your email account provider 4. don't respond to emails from people you do not know
39
What is 'pharming'?
obtain personal information such as usernames, passwords and bank details but target shopping and banking websites
40
How is pharming done?
infect legitimate websites with malicious code that will re-direct you to their bogus version of the website
41
How to protect yourself against pharming?
1. check the URL of the website | 2. make sure you are on a secure website (https)
42
What is 'smishing'?
SMS phishing - phishing through text messages
43
How to protect yourself against smishing?
1. never give your bank details or passwords out over phone or text message 2. ignore text messages from people you don't know 3. report any phishing attempts to your mobile phone company
44
What is 'spam'?
'junk email' or 'bulk email' sent automatically to thousands, or even millions of email inboxes
45
Why do people send spam?
attempt to gain people's personal data (like bank info) through phishing advertise low quality products spread viruses
46
How do spammer get your email address?
mailing lists social networking sites chat rooms programs that automatically trawl through websites looking for and collecting email addresses bought illegally from dishonest employees of a busines
47
How to recognise spam email?
strange sender you are asked to buy something or send cash asked to send passwords, bank details or other personal information email is full of spelling or grammar errors asked to carry out a task immediately asked to click a link
48
How to prevent spam?
use spam filters | don't post your email address in public websites like chat rooms or social networking sites
49
What is encryption?
scrambing data into garbled code using an encryption key, so even if data is stolen, it cannot be understood by the thief
50
Process of encrypting a file
1. create an encryption key 2. give the receiver a copy of the encryption key 3. encrypt the personal message using encryption software and the encryption key. once encrypted, the message will just look like scrambled nonsense 4. send the encrypted message to the receiver via the internet 5. the receiver gets the message and decrypts it by the encryption key
51
When should you get encryption?
files containing bank account or credit card data buying items on the internet using credit/bank cards any data containing confidential medial records emails you wish to remain private any data that can be used to commit identity fraud
52
Moderated forums
where all user comments are checked by an administrator before they are posted onto the forum
53
Un-moderated forum
used for online discussions but they do not have administrators or moderators
54
The security of moderated and un-moderated forums
``` Moderated: no racist or offensive content no swearing less chance of being exposed to spam personal data is more secure ``` ``` Un-moderated: high chance of being exposed to racist/offensive content swear words spam adverts greater risks of phishing ```
55
Computer virus
programs that automatically make copies of themselves and then attach to other files within the computer
56
Effects of computer virus
pop-up messages on the screen computer slows down and crashes a lot delete important files or data access personal data like passwords, bank details or credit card numbers
57
How do viruses infect computers?
download infected files from the internet email attachments portable storage media
58
How to prevent virus infection?
use up-to-date anti-virus software use genuine copies of software only open email attachments from people you trust download software from legitimate websites
59
Security risks of storing data in the cloud
have no control over the physical security of the data online storage company might go out of business hackers back-ups of data
60
What is a 'firewall'?
a program or hardware device that filters the data packets coming through the internet connection into your computer. [network]
61
Why are firewalls used?
protect your system from hackers, keyloggers, cyber threats