Chapter 8 - Safety and Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

CHAPTER 8:

SAFETY AND
SECURITY
Physical Safety 01

02 E-Safety

Security of Data 03
PHYSICAL SAFETY: PHYSICAL SAFETY
RISKS
Electrocution from spilling Ensure all drinks are kept away from
drinks the computers, ICT labs or office
desks.

Fire from sockets being Ensure plug sockets or extension


overloaded cables are not overloaded

Equipment overheating Ensure ventilation in the room is


good and equipment is not covered
whilst in use.

Tripping over trailing cables Ensure cable ducts are used to


cover wires.
Ensure cables are tucked away.
PHYSICAL SAFETY: STRATEGIES TO MINIMIZE POTENTIAL SAFETY
RISKS:
Strategies to minimise potential safety risks:
• Regular maintenance of equipment to check if it is passing safety
standards.
• Regular check of the state of cables/plugs to ensure there is nothing
exposed.
• Use of wireless connections to eliminate the use of cables.
• Ensure potential trip hazards are under desks (bags, plug sockets).

Discuss why e-safety is needed:


• These days youngsters are not fully aware of the dangers the internet
poses and the potential risks they may put themselves under. For that
reason eSafety lessons are taking place in schools to educate young
people about the potential risks of using the internet appropriately so
that they know how to stay safe whilst being online.
E-SAFETY
Personal Data ● Contact details (Phone number/email
address)

● Address Details

● Personal Images

● Payment details including

● card and bank details

● Medical history

● Political views

● Family details

● Passwords
E-SAFETY:
Why Personal Data Should Be Confidential
And Protected

● Users can be stalked or even kidnapped


– status updates can alert people of
your location at a particular time.

● Details can be stolen, copied or pass on.

● Users could be blackmailed/ threatened


into doing inappropriate things.

● Customer details could be sold onto a


third party.
E-SAFETY

How To Avoid Inappropriate Disclosure


Of Personal Data

● Ensure privacy setting in social media


sites have been activated.

● Do not share data via social media or


emails with strangers.

● Do not post inappropriate images or


content.
E-SAFETY
Minimise the Potential Dangers
Personal Use of Internet • Only use trusted websites or those
recommended by teachers.
• General browsing – keeping up • Only use a student friendly search
to date
with current affairs.
engine with safety filters.
• Researching for school projects. • Restrict access to certain content via ISP
• Online shopping/banking or filtering software.

Use of Email • Only email people already known to you or


• To keep in touch with friends, family from your contacts list.
and co workers. • Think before opening an email from an
• To share information including unknown person.
attachments - Images, Presentations etc. • Be careful about emailing your
• To get in touch with organisations. school’s name or a picture of
yourself in school uniform.
E-SAFETY
Minimise the Potential Dangers
Use of Social Media Know how to block and report unwanted users in
• Personal Use: Share information chat rooms.
about yourself to your friends Never give out any personal information online.
and followers. Never arrange to meet strangers especially in a
• Business Use: secluded place.
Promotion/Awareness Keep adults informed about your use of social
media.

Online Gaming
• Online gaming is now very popular • Never use real name when playing games
over many platforms. More games online.
are now providing multiplayer • Use appropriate language when using
options with some games. headsets and communicating with other
• Maps especially created for online gamers.
gamers. • Only play online with trusted friends.
SECURITY OF DATA: HACKING

WHAT IS HACKING?
To gain unauthorized access to a
computer system without the user
knowledge or permission
SECURITY OF DATA: HACKING

WHY DO PEOPLE TRY TO HACK INTO COMPUTER SYSTEMS?

● To cause damage to files/data


by deleting or changing them

● To commit fraud by stealing


data

● To access sensitive information


SECURITY
COMPANY ● To simply see if they are clever
enough to beat the system’
security
SECURITY OF DATA: EFFECT OF HACKING

IDENTITY THEFT STEALING COMPANY


INFORMATION
To steal user's identity
To expose a company
Name, addresses, social
security number Steal customer information, identity
theft

THEFT OF MONEY LOSS OF IMPORTANT


Bank details or credit INFORMATION
card details
To break havoc
Deleting any information that looks
important that can cause disruption
and stop production
SECURITY OF DATA: STRATEGIES TO PREVENT
HACKING TO PROTECT DATA
Use of firewalls
• sometimes part of the operating system

Use of strong passwords


• Use of strong passwords which are frequently changed

Use of protection software


• to detect and block possible hacking attempts.

Use of professional hacker


START START START
• Hire a professional hacker to test the weaknesses of your
• system
SECURITY OF DATA: STRATEGIES TO PREVENT
HACKING TO PROTECT DATA
NOTE:
Using strong Passwords: Input masks usually
make each characters
• Passwords should be combinations of of a password look like
letter, numbers and symbols star (*)

• A password should only be known by For example: If my


the user who owns it password is 1234, the
input mask would make
• To help keep password secret, input it look lie **** to
START START anyone
STARTtrying to peek.
masks are used to hide them whilst
being enter
SECURITY OF DATA: STRATEGIES TO PREVENT
HACKING TO PROTECT DATA
Features of a good password:
Robust means ‘hard to
• A good password is robust guess’

• Robust passwords should make use


of the following features:
• Include a mixture of letters, numbers and symbols – (grj, 727. @#$)

• Include of UPPER and lower case letters

• Don’t START
use personal information about yourself that would
START START be easy to
guess (like your name or birthday)

• Don’t use obvious combinations (1234, abcd etc)


AUTHENTICATION TECHNIQUES

The best method is to just check that a


person accessing a computer system,
or a network allowed to do so.

BIOMETRIC AUTHORIZATION
The method of security is where
users are authenticated using one
of their body parts.
SECURITY OF DATA: WHAT IS A COMPUTER VIRUS?
A computer virus is a piece of programming code/software which can install and
replicate itself on to a computer system without the user’s permission.

2. 3.
Sometimes files can be Data files can be copied by
deleted – leads to the hacker or the files
computer malfunction could be corrupted.

1. 4.
Causes the computer to Could stop production until
crash – become slower the virus has been
quarantined.

Effects of a computer virus ?


SECURITY OF DATA: STRATEGIES TO PREVENT COMPUTER
VIRUS

Install antivirus Be careful about


software and clicking on links
regularly update from untrusted
it. websites.

Be careful about
Do not use downloading
software or USB attachments
from unknown from unknown
sources. email addresses.
SECURITY OF DATA: SPYWARE

Effects of Spyware?
● Effects of Spyware?

● Spyware software will send the data


back to person who planted the
spyware software on your computer.
This could include personal details like
What is Spyware? passwords and banking account
information.
Is a software which can
monitor your use of the ● Spyware software could also install
computer (internet browsing) additional software to read
and monitor and log key
pressed. ● cookie data and change web browsing
preferences.
SECURITY OF DATA: STRATEGIES TO PREVENT SPYWARE

1. 2.
The use of anti spyware The use of a pointing device to
software which is regularly select characters when
updated. entering sensitive data.
SECURITY OF DATA: PHISHING
What is Phishing?
The recipient will receive an email which looks
legitimate. The email will normally request the user
to update their details which could be their
password or payment details. To update the users
details they will have to click on a link which will
take them to a fake website.

Effects of Phishing?
The user will be tricked into entering their details
into a fake website. The sender of the initial
email will have gained personal details from the
user. These details can be used fraudulently or
for identity theft.
SECURITY OF DATA: EFFECTS OF
PHISHING?
The user will be tricked into entering their details into a
fake website. The sender of the initial email will have
gained personal details from the user. These details can be
used fraudulently or for identity theft.

STRATEGIES TO PREVENT
PHISHING
• Use a filter on your email account so that only
emails from an allowed users appear in your inbox.

• Always double check the URL and email address.


SECURITY OF DATA: PHARMING
What is Pharming?
A malicious code installed
onto a web server or
computer will redirect users
to a fake website even though Strategies to
they have typed in a prevent Pharming
legitimate URL address. ● Anti spyware
software could
eliminate pharming
Effects of code from a
computer.
Pharming?
The fake website will look like the real website ● Always double
(websites tend to look like a trusted websites check the URL to
to deceive the user). Users will be tricked into see if is the same
entering their personal details. Like Phishing one you typed in.
this can lead to fraud or identity theft.
SECURITY OF DATA: SMISHING
What is Smishing (SMS Phishing)? Effects of Smishing?
● The effects are very similar to
● Users will receive fake SMS (text) messages Phishing and Pharming where
claiming they have won some sort of prize.
personal details will be
● Text message will appear to come from a obtained from users.
legitimate company.
● However, users could incur
● To claim the price users will have to call a additional costs when they
premium phone number or go to a website ring the premium number to
and give personal details. claim a prize.
SECURITY OF DATA: SMISHING
Strategies to prevent Smishing
● Double check the SMS message – check for
spelling mistakes.

● Check the link of the website to see if it is


legitimate?

● Contact your bank directly If you are


requested to change some details.
Vishing: Uses a voice
messages which tricks
users into calling a premium
rate telephone. Voice mail
may sound legitimate and
may request for user to
update their details.
SECURITY OF DATA: SPAM EMAIL
What is Spam Email? Effects of Spam Email?
● If a spam email is part of a phishing
● Spam (junk) email is sent out to recipients scam, then there is a chance your
from a mailing list. details could be obtained.
● The email could be part of a phishing scam ● The network could also become
or could be to promote certain products. slower or unresponsive if there is a
They are basically unwanted emails. lot of unnecessary traffic flooding
the network.
SECURITY OF DATA: SPAM EMAIL
Strategies to prevent Spam Email

● Use a junk email filter to stop spam email


coming into the inbox.

● Do not sign up for any commercial mailing


lists.

● Do not reply to spam email.


● Untick the check box if you are asked to
give your email to a third party.
SECURITY OF DATA: CREDIT CARD FRAUD

What is credit card fraud?

● Online credit card fraud is when a


user is tricked into giving their
personal and financial
information.

● This could be via phishing,


pharming or the use of spyware
software.
SECURITY OF DATA: CREDIT CARD FRAUD
Effects of credit card fraud? Strategies to prevent credit
card fraud.
● When a users account has been breached
(credit/debit card details have been
obtained)then unauthorized purchases can ● Have a strong password on
be made. your account.

● Also money can be transferred out of the ● Ensure website has a secure
account. connection.

● Install and update spyware


software.

● Regularly check bank


statement for any suspicious

● activity.
Biometrics is a method of authentication. It relies on unique characteristics of human beings.
Biometrics data is difficult to copy and requires the user to be present so that this method of
authentication can be used.
Advantage Disadvantage
Fingerprint Scans: • Very easy to use. • If the skin is damaged
Users will have press their finger • Very high accuracy. then it may be difficult
against the scanner. Finger prints • Small storage for the reader to read
are compared against those stored requirements for and recognise the
in the database. biometric data. fingerprint.
Retina/Iris Recognition: • Very high accuracy. • Very intrusive
Scans use infrared light to scan • No way to replicate a • Expensive to setup
unique patterns of blood vessels users retina. • Takes a while to scan.
in the retina.
Face Recognition: • Non-intrusive method • Physical features can
Physical facial features are • Cheap technology change over time with
scanned and compared to the age.
information held in the database.

Voice Recognition: • Non-intrusive method • Very low accuracy.


User will use speak which will • Cheap technology • Users voice could be
compare the voice to one held on • Verification is very affected by an illness.
the database. quick.

You might also like