Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

STRAND

-INFORMATION COMMUNICATION
TECHNOLOGY FOUNDATION
SUB STRAND
-SAFETY, HEALTH, SECURITY AND ETHICS
(1 HOUR)

FACILITATOR
MR. MUTAI
SPECIFIC LEARNING OUTCOMES
 a) investigate health risks related to use of ICT tools for

12/10/2021
safety,
 b) apply safety measures to reduce potential health risks
related to use of ICT tools,

MR.MUTAI
 c) analyse ethical and legislation concerns related to ICT
in learning,
 d) explore strategies to curb computer security threats and
attacks,
 e) appreciate examining computer attacks and security
threats to protect data.

2
HEALTH RISKS RELATED TO USE OF ICT
 Electrocution

12/10/2021
 Fire from sockets

 Headache

MR.MUTAI
 Eye strain

 Backache

 Tripping over cables

3
…HEALTH RISKS RELATED TO USE OF
ICT

12/10/2021
MR.MUTAI
4
…HEALTH RISKS RELATED TO USE OF
ICT

12/10/2021
MR.MUTAI
5
…HEALTH RISKS RELATED TO USE OF
ICT

12/10/2021
MR.MUTAI
6
SAFETY MEASURES

12/10/2021
 Electrocution
-well insulated cable and power sockets

MR.MUTAI
-Avoid overloading of power sockets ,it cause shock
and fire
-Avoid Faulty AC Adapter
-A faulty battery
 Fire from sockets

 -Avoid using faulty sockets

7
12/10/2021
 Headache
 Staring too much on the screen
 Make sure your computer monitor is at least 20 to 25

MR.MUTAI
inches away from your eyes.
 Consider purchasing a blue light filter for your glasses or
computer monitor.
 Keep the lighting in the room as bright as your monitor.
 Avoid overly dark rooms.
 Prevent glare on your computer screen.
 Make your font as large as possible.
 Take as many breaks as you can. Experts recommend 20
minutes away from your screen every two hours, in
addition to shorter breaks every 20 or 30 minutes.
 Sit up straight, as poor posture can lead to neck tension,
which can contribute to headaches 8
12/10/2021
 Eye strain,
 Bad monitor resolution, flickering, or glare at the

MR.MUTAI
monitor
 Poor lighting conditions in the computer room

 distance between eye and screen readability of


the screen
 Electromagnetic radiation emitted by the CRT
(UVA)
 Staring at anything for a long period of time

9
12/10/2021
 Backache
 caused from the efforts of the muscle to hold your

MR.MUTAI
posture for long periods of time
 sit in an upright neutral posture

 Uncomfortable chairs

 Poor posture

 Inactivity

 Use an adjustable computer desk

10
 ……Backache

12/10/2021
 Have the computer monitor at eye level
 Have your keyboard at a height that allows your elbows to
rest at your sides. Forearms should be level with the

MR.MUTAI
keyboard and parallel with the floor
 Adjust your chair so your feet are flat against the floor
 Use an ergonomic chair designed to hold your spine’s
natural curve
 Use an ergonomic keyboard that supports a natural hand-
wrist position
 Take short breaks
 Do stretching exercises at your desk
 Stand as much as possible
11
12/10/2021
 Tripping over cables)
 Run the cord or wire along a wall if possible

MR.MUTAI
 Run the cord along the ceiling

 Tape the cord to the floor with duct tape.

12
ETHICAL AND LEGISLATION IN ICT

12/10/2021
 Ethics
 -is a set of moral principles that govern the

MR.MUTAI
behavior of a group or individual. likewise,
computer ethics is set of moral principles that
regulate the use of computers.
 - Refers to the rules and standards governing the
conduct of an individual with others

13
ETHICAL AND LEGISLATION IN ICT

12/10/2021
 PLAGIARISM
- is copying someone else's work and then passing it off as
one's own

MR.MUTAI
 FILE PRIVACY
-Any computer document produced either by an individual in
his private home or in his office should remain private.
- No one has should open any document unless authorized by
the individual who created the file himself
 CREATION OF WORMS AND COMPUTER VIRUS
 Creation of worms and computer viruses is morally bad
when it is intended for malicious purposes like to steal
information or destroying of data.
 SOFTWARE PRIVACY
  reproducing a copy of the software and sells it for profit,
produces exactly the same or similar version without giving
proper credit to the original author, or simply produces it 14
and distributes it to others
…..ETHICAL AND LEGISLATION IN ICT

12/10/2021
 AVOID SPAMMING  Spamming is sending
unsolicited bulk and/or commercial messages over the
Internet.  Spamming is morally bad if it is intended

MR.MUTAI
to destroy and done by infringing on the right of
privacy of others
 INTELLECTUAL PROPERTY
- Industrial property ,- which includes inventions
(patents), trademarks, industrial designs, commercial
names, designations and geographic indications
(location specific brands) etc
-Copyright , which includes literary and artistic works
such as novels, poems and plays, films, musical
works, artistic works such as drawings, paintings,
photographs, sculptures, and architectural designs 15
….. ETHICAL AND LEGISLATION IN ICT

12/10/2021
 The World Intellectual Property Organization
(WIPO), has established similar guidelines in its
Copyright Law, for example. It is also generally

MR.MUTAI
agreed that the owner of the copyright (and only
the owner!) is authorized to do the following with
the work:
 reproduce it

 prepare derivative works based upon it

 distribute copies of it to the public

 perform the work publicly (if applicable)

 display the work publicly. 16


COMPUTER SECURITY THREATS AND
ATTACKS

12/10/2021
 SECURITY
 -protection of information ,hardware and

MR.MUTAI
software against computer crimes,physical and
natural hazards
 Privacy

 -protection of private data or information agaist


misuse or anauthorirised access

17
CAUSES OF DATA LOSS
 Attack by malicious programs

12/10/2021
-e.g viruses,worm and trojan horse
-virus
–it migrate through removable devices and computer network

MR.MUTAI
causing system failure or data loss
Worm
-it self replicates hence clogging the memory
Trojan-
-programs that masquerade as something else, may come in form
of downloadable games or free screen savers etc.
 Data manipulation
-altering or deleting data/inforamation for the purpose of sabotage
 Piracy
-illegal copying of copyrights protected data of data/information or
18
software
STRATEGIES TO CURB COMPUTER SECURITY
THREATS AND ATTACKS

 Encryption-coding of data/information

12/10/2021
 Enforcing data & information access control policies

 Reinforce computer room security

MR.MUTAI
 Install security and antivirus software

 Put in place data recovery plan- backing up data,avail


fire extinguishers
 Avoid downloading stuff you are not sure of.

 Enable write protection on removable disk

 Use surge protectors &UPS –protect computers


against brownout or blackout

19
COMPUTER SECURITY THREATS AND
ATTACKS

12/10/2021
MR.MUTAI
20
12/10/2021 MR.MUTAI
21
ASSIGNMENTS
KEY INQUIRY QUESTION

12/10/2021
 How do you reduce health risk related to use of ICT
devices?
 How do you curb ICT security threats and attacks?

MR.MUTAI
22

You might also like