electricaloverload: Electrical circuit overloads are when too many electrical items are plugged into one socket causing more current to be put across an electrical wire or circuit it can handle.
To prevent training cables cables can be placed inside ducts or under the carpet or flooring.
E-safety is a term associated with the use of the internet and also with other means of using electronic media to communicate.
E-safety refers to protecting everyone from harm while they are using new and developing technology so that they d not put themselves or others at risk.
the hazard can be split into two types:
illegal or inappropriate content.
contact.
illegal or inappropriate content includes:
copyright issues
plagiarisim
inappropiate images
social network software.
contact hazard includes:
inappropriate contact with adults.
bullying
financial risk
E-safety seack to protect children, young people and vulnerable adults from the adverse consequences that can be associated to the use of electronic media.
Some search engines have safe modes to ensure that search results do not bring up inappropriate sites.
search engine: a program that searches for and identifies items in a database to match the keyword(s) that you type in.
personal data: data relating to a living individual: it covers any information that relates to an identifiable living individual.
social networking sites: types of websites or services that allow you to interact with friends and family online and to find other people online who have similar interest or hoobies.
social networking sites may rise problems such as:
cyberbullying
slander
abuse
explotation
etc...
Cookies can be used to track your online browsing
Cookies are also used to remember preferences for a web page.
InPrivate browsing prevents data being stored about your browsing session.
A Pop-up Blocker will disable pop-up advertisements that you see when using your web browsing software
Tracking refers to the collection of your browsing data.
The tracking protection feature willl identify and block trakers.
before disclosing personal data:
ask yourself questions
use the built-in tools on your internet browser
instal antivirus and security software and keep software update.
The built in tools on the internet browser include:
cookies, do not track, InPrivate browsing, Location, Pop-up blocker, and tracking protection.
Identify theft is a type of fraud where personal information is stolen and used to impersonate that person.
malware is software that has been designed to sniff out personal information on a computer.
Botnets are created using malware for sending spam emails or flooding a website with many requests for content that the server cannot cope.
Hacking is any attempt to gain unauthorized access to data in a computer system.
Security of data is concerned with keeping data safe and uncorrupted by restricting access to the data so that there is less chance of malicious damage to it.
Security of data is also concerned with the recovery of data if it has been damaged.
Information assets: valuable data that you wouldn't want to be stolen or corrupted.
Hacking is maliciu¿ous damage caused by people who get into computer system when they have no right to access that system.
effects of hacking include:
lose all your data
decreased privacy
Things that can be done to protect data from hacking include:
use authentication(user IDs and passwords)
use data encryption
keep a copy of files
Biometric data refers to records used to identify people.
Biometric data are records that are used to identify people by physical attribute that does not change.
Biometricdata falls into two categories: Physiological biometric data and behavioral biometrics.
Physiological biometric data relates to a physical aspect of a person's body such as a fingerprint or a retina scan
Biometrical devices tend two work in one or two main ways verification or identification.
For verification, biometric technologies perform a comparison of the data with a template that has previously been stored, such as, fingerprint scan, retina scan, or voice print.
For identification, once an item of data is captured, the system will try to match the data with any existing item in the database.
An example of identification biometrics is a database of fingerprints od known criminals.