Professional Documents
Culture Documents
ICT CH 1-10
ICT CH 1-10
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
8.2 e-Safety
8.2 e-Safety
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
8.2 e-Safety
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
What is Hacking?
Hacking
•
Chapter 8: Safety and Security
Effects of Hacking?
• To delete, corrupt, copy and edit files. Sensitive Data could be
sold to competitors.
• Identity theft – to steal users identity.
• To expose a company (for example wiki leaks).
• To cause disruption and stop production.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
What is Spyware?
Spyware
Chapter 8: Safety and Security
Effects of Spyware?
Spyware software will send the data back to person who planted
the spyware software on your computer. This could include
personal details like passwords and banking account information.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
What is Phishing?
Phishing
Chapter 8: Safety and Security
Effects of Phishing?
The user will be tricked into entering their details into a fake
website. The sender of the initial email will have gained personal
details from the user. These details can be used fraudulently or for
identity theft.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
What is Pharming?
Pharming
Chapter 8: Safety and Security
Effects of Pharming?
The fake website will look like the real website (websites tend to
look like a trusted websites to deceive the user). Users will be
tricked into entering their personal details. Like Phishing this can
lead to fraud or identity theft.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
Users will receive fake SMS (text) messages claiming they have
won some sort of prize. Text message will appear to come from a
legitimate company. To claim the price users will have to call a
premium phone number or go to a website and give personal
details.
Effects of Smishing?
The effects are very similar to Phishing and Pharming where
personal details will be obtained from users. However users could
incur additional costs when they ring the premium number to
claim a prize.
Vishing: Uses a voice messages
Strategies to prevent Smishing which tricks users into calling a
• Double check the SMS message – check for spelling premium rate telephone. Voice
mistakes. mail may sound legitimate and
• Check the link of the website to see if it is legitimate? may request for user to update
• Contact your bank directly If you are requested to their details.
change some details.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
Spam (junk) email is sent out to recipients from a mailing list. The
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails.
Online credit card fraud is when a user is tricked into giving their
personal and financial information. This could be via phishing,
pharming or the use of spyware software.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
Biometrics is aof
8.3 Security method
Data of authentication. It relies on unique characteristics of human beings.
Biometrics data is difficult to copy and requires the user to be present so that this method of
authentication can be used.
Chapter 8: Safety and Security
Advantage Disadvantage
Fingerprint Scans: • Very easy to use. • If the skin is damaged
Users will have press their finger • Very high accuracy. then it may be difficult
against the scanner. Finger prints • Small storage for the reader to read
are compared against those stored requirements for and recognise the
in the database. biometric data. fingerprint.
Retina/Iris Recognition: • Very high accuracy. • Very intrusive
Scans use infrared light to scan • No way to replicate a • Expensive to setup
unique patterns of blood vessels users retina. • Takes a while to scan.
in the retina.
Face Recognition: • Non-intrusive method • Physical features can
Physical facial features are • Cheap technology change over time with
scanned and compared to the age.
information held in the database.
Voice Recognition: • Non-intrusive method • Very low accuracy.
User will use speak which will • Cheap technology • Users voice could be
compare the voice to one held on • Verification is very affected by an illness.
the database. quick.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
To protect your personal data from being obtained you need to be fully
aware of phishing, pharming and vishing scams. There are always signs
Chapter 8: Safety and Security
which should cast doubt to whether you should disclose your personal
information. Also the use of an updated spyware software would help
improve security on your computer.
Why is it Used
Firewall • Firewall provides security to a computer or
network.
Users Firewall • Is located between the computer and internet
Computer (Hardware Internet connection.
or software) • Firewalls will examine network traffic and block
and alert users to potential risks.
Passwords and User Name
Passwords are a method of authentication. They are used frequently online when logging
onto user accounts. If passwords are breached then your account may be hacked. Details
could be shared with other users of the internet.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
Encryption Key 1 2 3 4 5 6 7 8 9 10 11 12 13
A B C D E F G H I J K L M
14 15 16 17 18 19 20 21 22 23 24 25 26
N O P Q R S T U V W X Y Z
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
Digital Certificates
They are used to verify the identity of the sender in an online business transaction. It
also provides the opportunity for the receiver to give an encrypted response.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience
Audience Appreciation
It is very important to tailor an ICT solution to the proposed audience. A number of factors
need to be taken into consideration to ensure the ICT solution is suitable for its target
audience.
Chapter 9: Audience
The following methods can be used to find out more Once the ICT team are aware of
about the potential target audience. the customer needs then they
can take the following into
• Interviews
consideration:
• Questionnaires
• Market Research
Use of Language
Based on the research the ICT team will have a
clearer idea about the following factors: Use of colours
Usability
Copyright laws protect software in very much the same way as music CDs, Video etc. Software
Piracy is a continuous issue for software developers and measures have been put in place to
make it more difficult to use illegal copies of software.
Chapter 9: Audience
When creating an ICT solution consideration also has to be taken regarding legal, morality,
ethics and cultural issues.
Legal: Ensure copyright laws are abided by including not using any coding or branding from
Chapter 9: Audience
Morality: To distinguish from right or wrong. Sometimes it may not be illegal to carry out an
act however it could be against your morals. For example setting up a fake website to deceive
is not illegal but questions your level of morality.
Ethics: Is to break a code of conduct. One example could be to leak information to a rival
software publisher or to the press about new software ideas.
Culture: When software is released in different cultures then care must be taken so that people
are not offended. For example certain use of words could be offence to one culture and not to
another. If certain computer games mock religion or cultural beliefs then again this could cause
offence.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience
The debate continues on to whether the internet should be policed. The following are some
reasons why some users of the internet believes the internet needs policing:
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Email is very popular form of communication between people. However many countries have
laws to protect people from the misuse of emails.
Chapter 10: 10. Communication
Below are some laws which companies and individuals have to follow when using email:
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Senders should check for Netiquette: The rules of Avoid humor as some people
spelling and grammatical errors. may not understand the joke.
etiquette that apply when
communicating over
Respond quickly to an email Do not plagiarize and obey the
computer networks,
message. copyright law.
especially the Internet
the email is not forwarded onto a third party. It could also be a case of
attachments being downloaded and also passed on.
If your email account is not secure then emails could be sent from You could also be at
your account without your permission or knowledge. risk due to email
scams
Your email account could be hacked due to the following reasons: (phishing/pharming).
Spam (junk) email is sent out to recipients from a mailing list. The
• Use a junk email filter to stop
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails. spam email coming into the
inbox.
• Do not sign up for any
Effects of Spam Email? commercial mailing lists.
If a spam email is part of a phishing scam then there is a chance • Do not reply to spam email.
your details could be obtained. The network could also become • Untick the check box if you
slower or unresponsive if there is a lot of unnecessary traffic are asked to give your email
flooding the network. to a third party.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
HyperText Transfer Is the rules which are followed when transferring information across
Chapter 10: 10. Communication
Protocol (HTTP) & the internet. Rules are agreed between the sender and recipient
(HTTPS) when data is being transferred.
Uniform Resource • A web browser allows the user to display a webpage. A web
Locator (URL) & Web browser will use URLs to access specified websites.
Browser • URLs are represented by numbers (http://100.100.100.1)
however it is not very user friendly.
• So therefore an alphanumeric format (http://www.yahmad.o.uk)
HTTP or
HTTPS
http://www.yahmad.co.uk/Pages/Chapter18.html
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Internet Service
Provider (ISP) ISP is a company which provides internet
access to users. Normally the users would
have to pay a monthly fee. Broadband
connections tend to use fire-optic cables
for increased bandwidth.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Advantages Disadvantages
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Search Engines
Chapter 10: 10. Communication
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Blogs and Blogging • A blog is based on personal experiences and usually updated
Chapter 10: 10. Communication
by one author.
• Blog entries are in order (most recent entries are shown first).
• Blogs can not be changed by other users of the internet.
• Bloggers can be prosecuted for posting offensive material.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication
Advantages Disadvantages
• Regularly updated in real time. • Not regulated
• Vast amount of information. • Online threats (hacking/viruses/scams/
• Can find information using search engines. cyber bullying)
• Is available on many platforms. • Easily become distracted
• Web content can include text, images, • Sharing of illegal content
video, sounds, animations etc. • Exposure to inappropriate material
• Information may not be reliable
Why the internet is so popular? The internet has also evolved over the years with the
introduction of social networks, media streaming sites,
online shopping/banking.
How to evaluate the • Checking the websites URL address (ending in .gov or
reliability of information .ac more likely to be reliable)
found on the internet • Check links or endorsements from other websites.
• Check the last time the website was updated.
WWW.YAHMAD.CO.UK