Professional Documents
Culture Documents
IGCSE ICT Chapter 8_Safety and Security
IGCSE ICT Chapter 8_Safety and Security
IGCSE ICT Chapter 8_Safety and Security
Online Safety!
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 1
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 2
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 3
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 4
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. The office must be a safe working environment .
State two physical safety issues that might exist from the introduction of computers. [2]
Mar/P_12/Q9d/2022
• Answer:
✓ Tripping over trailing cables on the office floor
✓ Fire caused by overheating computers
✓ Fire caused by overloaded sockets
✓ Electrocution caused by spilling drinks on the computer
✓ Injuries caused by equipment falling
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 5
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. M_J/P_11/Q12a/2022
✓ Use CO2 fire extinguisher
✓ Don’t overload sockets
✓ Have fans/cooling system
✓ Use Residual Circuit Breaker/RCB
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 6
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑E-safety refers to the safe and responsible use of
technology by its users.
• E-safety involves how to behave when using
technology such as:
✓When using the internet.
✓Sending and receiving emails
✓Using social media
✓Online gaming
https://www.educationandtraining.org.uk/sources-e-safety-
information-advice-support-children-young-people/
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 7
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
https://blog.numbernagar.com/2019/11/01/an-awakening-call-towards-the-state-of-digital-literacy-and-online-safety-of-our-children/
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 8
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑Data protection
• Most countries have data protection acts (DPA) designed to
protect individuals and to prevent incorrect or inaccurate storage
of data.
• DPAs protect the rights of individual from whom data is being
collected, on the storage, use disclosure of computerized data and
paper records.
• Some principles of data protection acts are:
• Data must be fairly and lawfully processed.
• The purpose must be stated
• Collected data must be adequate, relevant and not excessive.
• It should not be kept longer than the stated duration
• It must be well secured
• Its must not be transferred to other parties unless adequate protection
is guaranteed.
• Failure to follow these rules can lead to fines or imprisonment.
https://www.enzuzo.com/blog/data-privacy-laws
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 9
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑Data protection
• Preventing unlawful data access:
✓Ensure personal data is not left lying around unattended to.
✓Do not leave sensitive data on computer monitors
unattended to. Log off each time you are living your desk.
✓Use strong passwords and user IDs to secure your
computers.
✓Regularly change your passwords and login IDs
✓Do not share sensitive information through emails or faxs.
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 10
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 11
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑ Personal data
• Personal data is data about a living person that can be used to identify that
person or be used with other information to identify an individual.
• Examples of personal data
✓ Name, home address, IP address, email address),
✓ ID card/ passport number,
✓ Date of birth (DOB)
✓ Banking details
✓ Photographs.
• Some personal data is considered sensitive and should be handled with extra
care. Examples of sensitive personal data:
✓ Political views
✓ Political affiliations (party)
✓ Religious beliefs
✓ Sexual orientation/gender
✓ Criminal records
✓ Medical history
✓ Ethnicity/race
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 12
IGCSE ICT CHAP: 6 ICT APPLICATIONS
Personal data is data relating to an individual/person that can be used to identify that person
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 13
IGCSE ICT CHAP: 6 ICT APPLICATIONS
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 14
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑Using the internet
• Some rules to follow to stay safe online
✓ Ensure the websites you visit/use are secured by locking for https or a padlock sign.
✓ Only do online shopping on sites with encrypted connections/payments options.
✓ Always conduct online search in safe search with the high level of security.
✓ Only use recommended or trusted websites by teachers or parents.
✓ Be careful of what you download from online
✓ Always sign out from sites after using them.
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 15
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑Sending and receiving emails
✓ Only open email attachments or links from known sources
✓ Ensure your ISP has effective email filtering for spams
✓ Only reply to emails from people you know or have an good idea
of the email origin.
✓ Always ensure you don’t mention personal information like your
school when replying to emails.
✓ Ensure emails with company addresses are well checked to match
with the actual company before replying to them.
✓ Manually type in email addresses
✓ Avoid clicking on hyperlinks within emails, they could be phishing
scams
✓ Take care when copying people or forwarding emails to multiple
people.
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 16
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑Using social media
How to safe online!
✓ Do not send personal photos to people you do not know.
✓ Make use of privacy settings when posting photos online
✓ Do not give out personal information to people you do not know.
✓ Ensure photos you post online can not link you to a place
✓ Do not accept friend requests from people you don’t know.
✓ Avoid forwarding inappropriate messages
✓ Always respect other peoples confidentiality
✓ Never arrange to meet with people you don’t know
✓ Report any form of online abuse to an adult.
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 17
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 18
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
8.2 E-Safety.
❑Online gaming
Some risks associated with online gaming:
✓ Be ware of online predators in gaming environments
✓ Cyberbullying; sending threatening or intimidating
electronic messages to people online
✓ Avoid the use of webcams
✓ Use of voice masking technology
✓ Possible cyber attacks
✓ Game violence can translate to violent behavior in the
individual.
https://www.grantthornton.in/insights/blogs/self-regulatory-bodies-
for-online-gaming-sector-a-game-changing-policy-measure/
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 19
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. M_J/P_11/Q12b/2022
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 20
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. M_J/P_11/Q12c/2022
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 21
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 22
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 23
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 24
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
https://www.universalcpareview.com/ask-joey/what-is-a-pharming-attack/
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 25
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Trojan horse
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 26
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
• • •
• Viruses Programs or software that
can replicate/copy itself
Computer can be caused to
stop functioning well or
Install and keep updated
anti-virus software.
within a user computer crashed. • Be careful when opening
with the intention of • Deletion of files from email attachments.
deleting, corrupting files computer. • Do not use software from
etc. • Corrupt Operating system unknown sources
• • •
• worms Self-replicating viruses
capable of spreading in the
Spreads through out the
network and corrupts files
Use up to date anti-virus
software.
whole computer and and the network. • Carry out regular antivirus
corrupting the whole scans
network.
• They are inbuild to
computer software or
emails and replicate
unnoticed.
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 27
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 28
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Ransomware • Programs that encrypts data in • Immediate encryption of a • Avoid phishing emails
someone's computer system and user’s data. • Regularly back up
holds it hostage. • Blackmail important files
• The owners are often asked to pay
for the decryption key.
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 29
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 30
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 31
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
https://abilitynet.org.uk/factsheets/voice-recognition-overview
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 32
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 33
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 34
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 35
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
https://www.geeksforgeeks.org/difference-between-http-and-https/
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 36
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. Nov_/P_13/Q7c/2021
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 37
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
https://kinsta.com/knowledgebase/what-is-encryption/
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 38
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. Nov/P_13/Q5a/2021
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 39
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
❑Firewalls
▪ A firewall can be in the form of software or hardware which forms a secure layer between your
computer and an external network.
▪ Firewall in form of software is usually installed as part of the operating system
▪ A gateway is a firewall in the form of hardware which can monitor communication between networks.
▪ A firewall filters incoming and outgoing network traffic to ensure secure communication.
▪ Tasks carried out by firewalls?
✓ Examines network traffic between incoming and outgoing communications
✓ Checks outgoing/incoming data to meet particular standars
✓ Provides warnings for software installations and upgrades.
✓ Blocks data that does not meet the required criteria for transmission
✓ Can be used to prevent access to undesirable sites
✓ Can prevent viruses and hackers
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 40
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Enter username*
Code sent to Enter the
Enter password*
email or number received code
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 41
IGCSE ICT CHAP: 8. SAFETY AND SECURITY
Exam question
Q. Nov/P_13/Q5b/2021
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 42
IGCSE ICT CHAP:8.
Safety and Security
References:
1. Cambridge IGCSE Information and Communication Technology, 3rd edition.
Graham Brown, David Watson
2. https://www.cambridgeinternational.org/search/gcsearch.aspx?q=ict
IGCSE ICT REVISION: CHAP 8 SAFETY AND SECURITY #ICT WITH TATCHEN 43