Professional Documents
Culture Documents
Chapter 8 - Safety and Security
Chapter 8 - Safety and Security
Chapter 8 - Safety and Security
SAFETY AND
SECURITY
Physical Safety 01
02 E-Safety
Security of Data 03
PHYSICAL SAFETY: PHYSICAL SAFETY
RISKS
Electrocution from spilling Ensure all drinks are kept away from
drinks the computers, ICT labs or office
desks.
● Address Details
● Personal Images
● Medical history
● Political views
● Family details
● Passwords
E-SAFETY:
Why Personal Data Should Be Confidential
And Protected
Online Gaming
• Online gaming is now very popular • Never use real name when playing games
over many platforms. More games online.
are now providing multiplayer • Use appropriate language when using
options with some games. headsets and communicating with other
• Maps especially created for online gamers.
gamers. • Only play online with trusted friends.
SECURITY OF DATA: HACKING
WHAT IS HACKING?
To gain unauthorized access to a
computer system without the user
knowledge or permission
SECURITY OF DATA: HACKING
• Don’t START
use personal information about yourself that would
START START be easy to
guess (like your name or birthday)
BIOMETRIC AUTHORIZATION
The method of security is where
users are authenticated using one
of their body parts.
SECURITY OF DATA: WHAT IS A COMPUTER VIRUS?
A computer virus is a piece of programming code/software which can install and
replicate itself on to a computer system without the user’s permission.
2. 3.
Sometimes files can be Data files can be copied by
deleted – leads to the hacker or the files
computer malfunction could be corrupted.
1. 4.
Causes the computer to Could stop production until
crash – become slower the virus has been
quarantined.
Be careful about
Do not use downloading
software or USB attachments
from unknown from unknown
sources. email addresses.
SECURITY OF DATA: SPYWARE
Effects of Spyware?
● Effects of Spyware?
1. 2.
The use of anti spyware The use of a pointing device to
software which is regularly select characters when
updated. entering sensitive data.
SECURITY OF DATA: PHISHING
What is Phishing?
The recipient will receive an email which looks
legitimate. The email will normally request the user
to update their details which could be their
password or payment details. To update the users
details they will have to click on a link which will
take them to a fake website.
Effects of Phishing?
The user will be tricked into entering their details
into a fake website. The sender of the initial
email will have gained personal details from the
user. These details can be used fraudulently or
for identity theft.
SECURITY OF DATA: EFFECTS OF
PHISHING?
The user will be tricked into entering their details into a
fake website. The sender of the initial email will have
gained personal details from the user. These details can be
used fraudulently or for identity theft.
STRATEGIES TO PREVENT
PHISHING
• Use a filter on your email account so that only
emails from an allowed users appear in your inbox.
● Also money can be transferred out of the ● Ensure website has a secure
account. connection.
● activity.
Biometrics is a method of authentication. It relies on unique characteristics of human beings.
Biometrics data is difficult to copy and requires the user to be present so that this method of
authentication can be used.
Advantage Disadvantage
Fingerprint Scans: • Very easy to use. • If the skin is damaged
Users will have press their finger • Very high accuracy. then it may be difficult
against the scanner. Finger prints • Small storage for the reader to read
are compared against those stored requirements for and recognise the
in the database. biometric data. fingerprint.
Retina/Iris Recognition: • Very high accuracy. • Very intrusive
Scans use infrared light to scan • No way to replicate a • Expensive to setup
unique patterns of blood vessels users retina. • Takes a while to scan.
in the retina.
Face Recognition: • Non-intrusive method • Physical features can
Physical facial features are • Cheap technology change over time with
scanned and compared to the age.
information held in the database.