Topic 6: Issues Press F5 to view!

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
The laws Organizations are covered by lots of different laws
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Hackers And Hacking.
Internet Safety Internet Safety LPM
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Unequal access to ICT. The digital divide  The gap between people who do not have access to digital technology and those who do. People who have no access.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Safety.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Misuses of ICT Malpractice and crime © Folens 2008.
DIGITAL CITIZENSHIP What You Should Know!.
E-Safety Briefing
IT Security  .
Unit 4 IT Security.
Personal spaces.
Digital Citizenship Middle School
Handling Personal Data
Information Security.
University of west Alabama Ed 505 Tasha Vaughn
Topic 5: Online Communities Press F5 to view!
Issues Security and Privacy issues Health and Safety
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
© EIT, Author Gay Robertson, 2017
THE PYRAMID OF KNOWLEDGE
Information Technology Services Education and Awareness Team
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety and The Digital Divide
Unit 4 IT Security Kerris Davies.
ICT Communications Lesson 3: Internet Life and Privacy
Welcome to the E Safety Workshop
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
The social impact of ICT on society
What devices use the internet?
G061 - Network Security.
Presentation transcript:

Topic 6: Issues Press F5 to view! GCSE ICT Revision Topic 6: Issues Press F5 to view!

Security Issues Physical threats – such as theft, flooding, fire and accidental damage. To avoid issues here; keep computers locked in rooms and back up any data. Hackers – these try to get access to data without your permission. To avoid issues here; use firewalls, passwords and encrypt information travelling across networks. Phishing – this cons people into giving out personal details via email or text. To avoid issues here; use secure websites, avoid giving out details unless 100% genuine.

Security Issues Viruses – are designed to be harmful to digital devices and spread easily over networks. To avoid issues here; don’t trust attachments on emails from unknown people, install anti-virus. Bluejacking – the process of sending unwanted messages over open Bluetooth connections. To avoid issues here; keep Bluetooth switched off when not in use. Cookies – storing passwords etc. in cookies makes it easier for others to gain access to your accounts and personal information. To avoid issues here; delete cookies!

Privacy Issues You need to make sure you’re away of the various privacy issues when using ICT. These have been highlighted in the previous 5 topics and include: Hacking Spyware Identity Theft Cookies Social Networking Privacy Issues

Monitoring Movements ICT is used to monitor how we move about and how we communicate: Passports are scanned and our movements between countries are monitored. Some passports now also contain a chip with information on. Your computer’s IP address provides details about your geographical information. Mobile phone companies can track your movements and know who you have contacted by phone or text. Geographical information from GPS enabled devices can track your position. The use of credit/debit cards provides a clue to our locations too.

Health and Safety Using ICT can have positive and negative effects on your physical health and mental well-being. Positives include the fact that friendships can be built online using Social Networking sites. ICT makes it easy to keep in contact with people. Easier to access information and learn new things. Mobile phones help keep us safer. GPS helps us find locations and guide us on routes. Exercise is possible at home using games such as the Wii.

Health and Safety - Negatives ICT can contribute to obesity due to inactivity. People can always access their work even on holiday and in the evenings – they can become ill or stressed as they feel they cannot stop working. Overuse of social networking and blogging sites. Repetitive strain injuries can develop from doing the same thing over and over. Joint pain can occur when sitting for a long time. Eye strain can be an issue when looking at screens for a long time. Radio waves from mobile phones can affect health.

Digital Divide Some people do not have access to ICT – the difference between these people and those who have access to ICT is called the Digital Divide. There are reasons for this. Economic – some people cannot afford technology and access to ICT/Internet. Education – some people do not know how to use computers. Disability or illness Location – people who live in remote areas may not be able to get phone or Internet connections.

ICT & Environment (Sustainability) E-Waste – old computer equipment often ends up in land fill sites. Good practice would be to send e-waste to less developed countries. Pollution – toxic substances from e-waste can get into soil and water supplies. Electricity – all digital devices use electricity. Production of electricity often generates greenhouse gases. Finite resources – some elements of digital devices are in short supply and will run out one day.

Laws Data Protection Act – this law prevents companies sharing your data without you knowing and legally binds them to protect your information, keep it up to date and delete it responsibility when they no longer need it. Computer Misuse Act – this law covers the use of computer equipment for illegal means (hacking, fraud etc.) Digital Economy Act – stops people downloading media (music etc.) illegally. ...you should also revise Copyright law from an earlier topic!