Section 8 - Safety and security Flashcards

1
Q

What is physical safety?

A

All about ensuring that you do not suffer any harm whilst working with computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of physical safety issues

A

Electrocution
Fire
Tripping over wires
Heavy equipment falling on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electrocution

A

Harm, or even death caused by an electric current passing through the body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Causes of electrocution

A

Faulty equipment
Spilling drinks over electrical equipment
Opening up an electrical device and messing with the hardware inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevention of electrocution

A

Make sure wires and insulated
Keep drinks away from equipment
Report any malfunctioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Causes of fires

A

Too many devices plugged into a single mains outlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prevention of fires

A

Plenty of main outlets
Don’t plug too many devices in the same outlet
Turn off and unplug devices of away for a long time
Fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Causes of tripping over wires

A

Long wires or cables trailing across a floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prevention of tripping over wires

A

Encase the wires
Tuck under carpets or desks
Use wireless technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Causes of heavy equipment falling

A

Not positioned securely onto desks

Poor quality and flimsy desks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevention of falling equipment

A

Make sure that equipment is positioned away from the edge of desks
Plenty of space on the table
Strong desks/tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Potential dangers of the Internet

A

Cyber predators
Cyber bullies
Data theft
Adult content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is personal data?

A

Anything that can be used to identify a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of personal data

A
Name
Address
Phone number
Photograph
Bank details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should you keep personal data private?

A

Prevent identity theft
Prevent theft of your money
Prevent burglary of your home
Prevent physical harm to yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is e-safety?

A

Knowing how to use the Internet safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to use the Internet safely?

A

Never reveal personal info
Only use websites recommended by teachers or parents
Only open emails from people you know
Know how to block people on social media and in chat rooms
Never post or email pictures of yourself in school uniform
Report unwanted users
Use the privacy controls on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Precautions when playing games online

A
Never reveal personal info
Use a nickname as your game name
Play online games that use anti-virus software
Know how to block people in the game
Report unwanted users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is hacking?

A

Where people gain unauthorised access to computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a key logger?

A

A special type of software that is secretly sent to a computer system and then ‘logs’ every key press that user of the system make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do people try to hack into computer systems?

A

Cause damage to files or data by deleting or changing them
Commit fraud by stealing data
Access sensitive information
See if they are clever enough to beat the system’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Effects of hacking

A
Identity theft
Theft of money
Stealing of customer information
Stealing email addresses
Loss of important information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is ‘authentication’?

A

Check that a person accessing a computer system or a network is allowed to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

User-IDs and passwords

A

If the correct user enters the correct password, they would be given access to the computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

User-IDs

A

are unique and identifies particular users as they log onto a computer system or a network

26
Q

Passwords

A

a combination of letters, numbers and symbols and should only be known by the user who owns it

27
Q

How to use a password effectively

A

change your password often
keep your password secret
don’t write your password down anywhere

28
Q

Biometric authorisation

A

users are authenticated using one of their body parts
e.g. face scans
iris scans
fingerprint

29
Q

Advantages of using biometric authentication

A

passwords can be forgotten, while body parts aren’t

not possible to forge body parts

30
Q

Disadvantages of using biometric authentication

A

high initial costs

31
Q

How to protect data online?

A

Digital certificates

Secure socket layer (SSL)

32
Q

What are digital certificates?

A

attached to emails and websites in order to prove who has sent the message

33
Q

What does the digital certificate consist of?

A

Sender’s email address
Name of the sender
A serial number
Certificate expiry date

34
Q

What is a secure socket layer?

A

used on websites where we use bank or credit card details in order to make purchases
e.g. httpS

35
Q

How does a SSL work?

A

encrypts the connection between your computer and the e-commerce website and ensure that all transactions are secure

36
Q

What is ‘phishing’?

A

when fraudsters try and ‘bait’ users into giving up our bank details, credit card info, usernames and passwords

37
Q

Where does phishing usually happen?

A

usually carried out over emails pretending to be from legitimate organisations like banks and building societies

38
Q

How to protect yourself against phishing?

A
  1. never give out bank details and passwords over email
  2. phishing sometimes promise you enormous wealth -> ignore them
  3. report any phishing attempts to your email account provider
  4. don’t respond to emails from people you do not know
39
Q

What is ‘pharming’?

A

obtain personal information such as usernames, passwords and bank details but target shopping and banking websites

40
Q

How is pharming done?

A

infect legitimate websites with malicious code that will re-direct you to their bogus version of the website

41
Q

How to protect yourself against pharming?

A
  1. check the URL of the website

2. make sure you are on a secure website (https)

42
Q

What is ‘smishing’?

A

SMS phishing - phishing through text messages

43
Q

How to protect yourself against smishing?

A
  1. never give your bank details or passwords out over phone or text message
  2. ignore text messages from people you don’t know
  3. report any phishing attempts to your mobile phone company
44
Q

What is ‘spam’?

A

‘junk email’ or ‘bulk email’ sent automatically to thousands, or even millions of email inboxes

45
Q

Why do people send spam?

A

attempt to gain people’s personal data (like bank info) through phishing
advertise low quality products
spread viruses

46
Q

How do spammer get your email address?

A

mailing lists
social networking sites
chat rooms
programs that automatically trawl through websites looking for and collecting email addresses
bought illegally from dishonest employees of a busines

47
Q

How to recognise spam email?

A

strange sender
you are asked to buy something or send cash
asked to send passwords, bank details or other personal information
email is full of spelling or grammar errors
asked to carry out a task immediately
asked to click a link

48
Q

How to prevent spam?

A

use spam filters

don’t post your email address in public websites like chat rooms or social networking sites

49
Q

What is encryption?

A

scrambing data into garbled code using an encryption key, so even if data is stolen, it cannot be understood by the thief

50
Q

Process of encrypting a file

A
  1. create an encryption key
  2. give the receiver a copy of the encryption key
  3. encrypt the personal message using encryption software and the encryption key. once encrypted, the message will just look like scrambled nonsense
  4. send the encrypted message to the receiver via the internet
  5. the receiver gets the message and decrypts it by the encryption key
51
Q

When should you get encryption?

A

files containing bank account or credit card data
buying items on the internet using credit/bank cards
any data containing confidential medial records
emails you wish to remain private
any data that can be used to commit identity fraud

52
Q

Moderated forums

A

where all user comments are checked by an administrator before they are posted onto the forum

53
Q

Un-moderated forum

A

used for online discussions but they do not have administrators or moderators

54
Q

The security of moderated and un-moderated forums

A
Moderated:
no racist or offensive content
no swearing
less chance of being exposed to spam
personal data is more secure
Un-moderated:
high chance of being exposed to racist/offensive content
swear words
spam adverts
greater risks of phishing
55
Q

Computer virus

A

programs that automatically make copies of themselves and then attach to other files within the computer

56
Q

Effects of computer virus

A

pop-up messages on the screen
computer slows down and crashes a lot
delete important files or data
access personal data like passwords, bank details or credit card numbers

57
Q

How do viruses infect computers?

A

download infected files from the internet
email attachments
portable storage media

58
Q

How to prevent virus infection?

A

use up-to-date anti-virus software
use genuine copies of software
only open email attachments from people you trust
download software from legitimate websites

59
Q

Security risks of storing data in the cloud

A

have no control over the physical security of the data
online storage company might go out of business
hackers
back-ups of data

60
Q

What is a ‘firewall’?

A

a program or hardware device that filters the data packets coming through the internet connection into your computer. [network]

61
Q

Why are firewalls used?

A

protect your system from hackers, keyloggers, cyber threats