Safety and security

Cards (72)

  • physical safety issues include:
    • spilling drinks.
    • electrical overload.
    • training cables
    • falling equipment
  • electrical overload: Electrical circuit overloads are when too many electrical items are plugged into one socket causing more current to be put across an electrical wire or circuit it can handle.
  • To prevent training cables cables can be placed inside ducts or under the carpet or flooring.
  • E-safety is a term associated with the use of the internet and also with other means of using electronic media to communicate.
  • E-safety refers to protecting everyone from harm while they are using new and developing technology so that they d not put themselves or others at risk.
  • the hazard can be split into two types:
    • illegal or inappropriate content.
    • contact.
  • illegal or inappropriate content includes:
    copyright issues
    plagiarisim
    inappropiate images
    social network software.
  • contact hazard includes:
    • inappropriate contact with adults.
    • bullying
    • financial risk
  • E-safety seack to protect children, young people and vulnerable adults from the adverse consequences that can be associated to the use of electronic media.
  • Some search engines have safe modes to ensure that search results do not bring up inappropriate sites.
  • search engine: a program that searches for and identifies items in a database to match the keyword(s) that you type in.
  • personal data: data relating to a living individual: it covers any information that relates to an identifiable living individual.
  • social networking sites: types of websites or services that allow you to interact with friends and family online and to find other people online who have similar interest or hoobies.
  • social networking sites may rise problems such as:
    • cyberbullying
    • slander
    • abuse
    • explotation
    • etc...
  • Cookies can be used to track your online browsing
  • Cookies are also used to remember preferences for a web page.
  • InPrivate browsing prevents data being stored about your browsing session.
  • A Pop-up Blocker will disable pop-up advertisements that you see when using your web browsing software
  • Tracking refers to the collection of your browsing data.
  • The tracking protection feature willl identify and block trakers.
  • before disclosing personal data:
    • ask yourself questions
    • use the built-in tools on your internet browser
    • instal antivirus and security software and keep software update.
  • The built in tools on the internet browser include:
    cookies, do not track, InPrivate browsing, Location, Pop-up blocker, and tracking protection.
  • Identify theft is a type of fraud where personal information is stolen and used to impersonate that person.
  • malware is software that has been designed to sniff out personal information on a computer.
  • Botnets are created using malware for sending spam emails or flooding a website with many requests for content that the server cannot cope.
  • Hacking is any attempt to gain unauthorized access to data in a computer system.
  • Security of data is concerned with keeping data safe and uncorrupted by restricting access to the data so that there is less chance of malicious damage to it.
  • Security of data is also concerned with the recovery of data if it has been damaged.
  • Information assets: valuable data that you wouldn't want to be stolen or corrupted.
  • Hacking is maliciu¿ous damage caused by people who get into computer system when they have no right to access that system.
  • effects of hacking include:
    • lose all your data
    • decreased privacy
  • Things that can be done to protect data from hacking include:
    • use authentication(user IDs and passwords)
    • use data encryption
    • keep a copy of files
  • Biometric data refers to records used to identify people.
  • Biometric data are records that are used to identify people by physical attribute that does not change.
  • Biometric data falls into two categories: Physiological biometric data and behavioral biometrics.
  • Physiological biometric data relates to a physical aspect of a person's body such as a fingerprint or a retina scan
  • Biometrical devices tend two work in one or two main ways verification or identification.
  • For verification, biometric technologies perform a comparison of the data with a template that has previously been stored, such as, fingerprint scan, retina scan, or voice print.
  • For identification, once an item of data is captured, the system will try to match the data with any existing item in the database.
  • An example of identification biometrics is a database of fingerprints od known criminals.