What is the Data Protection Act (DPA)?
Laws designed to protect individuals and prevent incorrect/inaccurate data being stored.
State one DPA principle.
Data must be fairly/ lawfully processed / Processed for stated purpose only / Adequate, relevant, not excessive / Accurate / Not kept longer than necessary / Kept secure / Not transferred without adequate protection.
Why is data protection legislation required?
Provides rules on using personal data / Regulates processing / Protects data subject’s rights / Prevents misuse by third parties.
What is e-safety?
Being safe on the internet.
Give an e-safety rule for young children.
Use age-appropriate search engines / Only visit recommended websites / Use software to limit web access.
Give an e-safety rule for email.
Be careful with unknown senders / Never open unknown attachments / Type website addresses directly / Check sender’s address in header.
What is hacking?
Gaining unauthorised access to a computer system.
Hacking effect.
Can lead to identity theft / Data can be deleted, changed, or corrupted.
How to avoid hacking?
Use firewalls / Use strong, frequently changed passwords.
What is phishing?
Email pretending to be trustworthy to steal personal information.
Phishing effect.
Creator gains personal data / Can lead to fraud or identity theft.
How to avoid phishing?
ISP/web browsers filter emails / Be cautious with emails/attachments.
Smishing vs. vishing.
Smishing uses SMS; Vishing uses voice calls/messages.
What is pharming?
Malicious code redirecting user to fake website without their knowledge.
Pharming effect.
Creator can gain credit/debit card details / Leads to fraud or identity theft.
How to avoid pharming?
Anti-spyware software / Be alert for website redirection clues.
Define malware.
Any malicious software designed to disrupt computer or data.
What is a computer virus?
Program that replicates, corrupts data, or uses memory to slow/crash computer.
What is a worm?
Program that replicates by finding network vulnerabilities, clogging bandwidth.
What is spyware/keylogging?
Records all key presses and sends data to perpetrator.
What is a Trojan horse?
Malware disguised as harmless software (e.g., game).
What is adware?
Program creating pop-up/banner adverts online.
What is ransomware?
Malware encrypting data and demanding ransom for decryption.
Anti-virus software function.
Protects against viruses / Scans with virus database / Alerts user / Removes/quarantines viruses.