Name 7 different security issues that could arise
Bluejacking Physical threats Hackers Phishing Unsecured wireless networks Storing important info in cookies Viruses
What is bluejacking and how can it be prevented?
It is the process of sending unwanted messages to open Bluetooth connections.
It can be prevented by keeping Bluetooth switched off when it is not in use
Give some examples of physical threats and how you can reduce the risk of them
Theft, flooding, fire and accidental damage.
Keep computers in locked rooms and back up the data
How can you prevent hackers accessing your data?
Use firewalls, passwords and encrypt information travelling across networks.
What is phishing?
Cons people into believing that an email or text is from a valid organisation so that they give their personal details away which can then be used to commit identity theft.
Why are unsecured wireless networks unsafe and what can you do to make it safer?
They allow other users to easily see and use your wireless network which could cost you.
Make sure to secure wireless networks with a password and encrypt data travelling over the network.
Why is it important to manage cookies and how can you do it?
Storing important info in cookies makes it easier for other to gain access to your accounts.
You can manage and delete your cookies using options on your browser.
What do viruses do and how can you prevent them corrupting your data?
They cause your computer to stop functioning properly and they spread easily over networks.
Keep Bluetooth switched off when not in use and make sure to regularly scan for viruses. Do not download from free file sharing websites.
3 ways to ensure your data is well protected?
Install the latest updates for operating system and browser
Use encryption for the transmission and storage of data
Back up all your data
Name and explain 7 different privacy issues
Social networking sites- keep track of all your interactions and save them for later use
Search engines- record info about your searches including location, time spent searching and searches made. Info makes it easier for hackers to gain users’ personal info.
Tags- Photos online linked with name or other info is an invasion of privacy
Cookies- small text files storing info about your browsing habits and frequently visited websites
Identity Theft- Someone pretends to be someone else by collecting info about their identity
Hackers- Gain unauthorised access to your digital devices and access your personal info
Spyware- may be tricked into downloading it and it allows others to spy on info on your computer
What can you do to control your privacy?
Ways of monitoring people using ICT
Positive effects of ICT on our health and safety
Negative effects of ICT on our health and safety and how to combat them
Impact of networks on work
Impact of networks on communication
Impact of networks on creativity
Impact of networks on shopping
4 laws relating to the use of ICT
Explain the Data Protection Act
Protects us against the misuse of our personal data that may be held by a range of organisations. Personal data must be: -processed fairly and lawfully -adequate, relevant and not excessive -accurate and up to date -not kept longer than necessary -kept secure
Explain the Computer Misuse Act
Covers the misuse of computer equipment and illegal access to files.
The following are some things made illegal by it:
software piracy
planting viruses
hacking
fraud
Explain the Copyright Act
Makes it a criminal offence to steal or copy media or other people’s work or ideas. Therefore it is illegal to
Explain the Digital Economy Act
This stops people illegally downloading media. Internet Service Providers can collect data about repeat offenders and their Internet access can be slowed or suspended.
What is the digital divide?
The gap between people who do not have access to digital technology and those who do.