Safety And Safety

Cards (28)

  • Tripping Hazard:
    Cause:
    1. Trailing wires i.e. open wires
    Preventions:
    1. Use Cable Ducts
    2. Use Wireless
  • Fire:
    Cause:
    1. overloaded wall sockets
    2. exposed wires causing short circuits
    Preventions:
    1. increase wall sockets
    2. don't cover cooling vents
    3. clean dust
  • Overheating:
    Cause:
    1. computers giving lots of heat; rooms getting hot in the summers
    Preventions:
    1. install ac
    2. ensure ventilation
  • Heavy Equipment Falling:
    Causes:
    1. equipment not placed properly
    2. unstable desks
    Preventions:
    1. secure mounting
    2. regular inspections
    3. proper cable management - to avoid dislodging of equipment
  • Eloctrocution:
    Causes:
    1. faulty equipment
    2. spilling liquids
    3. exposed wires
    4. damaged insulation
    5. unsafe electrical equipment
    Preventions:
    1. no liquids near equipment
    2. regular inspection for damaged insulation
    3. use RCB
  • Personal Data:
    • Information that identifies an individual
    • Eg: Name, address, DOB, school uniform, medical history
  • Threats to personal data:
    • ID theft
    • Privacy Breach
    • Misuse of sale of information
    • Potential physical crimes or ransom situations
  • Avoiding data disclosure:
    • Keep personal data confidential with strong passwords and privacy settings.
    • Limit access to authorized individuals.
    • Be cautious of the information you share online.
    • Verify website details on the data collection, storage and usage.
    • Access personal data only on secure, encrypted connections.
  • Internet Safety:
    • Use trusted websites recommended by reputable sources.
    • Utilize search engines with age-appropriate information.
    • Never disclose personal data.
  • Email Safety:
    • Be cautious about emails from unknown sources.
    • Only send personal data or images via emails to known recipients.
  • Social Media Safety:
    • Block and report unwanted content messages.
    • Adjust privacy settings to limit visibility of posts.
    • Exercise caution when meeting online contacts in person.
    • Avoid sharing inappropriate content.
    • Respect others confidentiality and only accept friend requests from known indivisuals.
    • Keep parents informed about online activities and avoid sharing location details.
  • Online Gaming Safety:
    • Use usernames that don't reveal real names.
    • Avoid sharing personal or financial details with other players.
    • Know how to block or report players for inappropriate behaviors.
  • Cybersecurity Threats and Prevention:
    Hacking
    • Unauthorized access to computer systems.
    • Effects: Data deletion, corruption, theft, and disruption.
    • Prevention: Firewalls, strong passwords, security software, professional testing.
    Phishing
    • Deceptive emails or websites to steal personal information.
    • Effects: Identity theft, fraud.
    • Prevention: Email filters, verifying URLs and sender addresses.
  • Pharming
    • Redirecting users to fake websites.
    • Effects: Fraudulent data collection.
    • Prevention: Anti-spyware software, verifying URLs.
    Smishing
    • SMS-based phishing.
    • Similar to phishing with text messages.
    • Recipients asked for personal information or to visit malicious websites.
    • Prevention: Caution with unsolicited messages, verification of URLs.
    Vishing
    • Voicemail-based phishing.
    • Users tricked into calling fake numbers and providing personal data.
    • Prevention: Verification of caller identity, skepticism towards unsolicited calls.
  • Types of Malwares
    Viruses:
    Replicate/copy themselves to delete or corrupt files.
    Can cause computer malfunction.
    Spread through infected emails, websites, or software.
    Use anti-virus software and avoid unknown sources.

    Worms:
    Self-replicate to spread and corrupt networks.
    Spread without needing an active host program.
    Arrive as email attachments.
    Run up-to-date anti-virus software.
  • Trojan Horses:
    Disguised as legitimate software.
    Replace or modify legitimate software to harm.
    Often spread through email attachments or infected websites.

    Spyware:
    Monitors user activities on the computer.
    Collects and sends gathered information to cybercriminals.
    Can include keyloggers to capture keystrokes.

    Adware:
    Floods computers with unwanted advertising.
    Can hijack browsers or create pop-ups.
    May highlight security weaknesses.
  • Ransomware:
    Encrypts data and demands ransom for decryption.
    Often spread through Trojan horses or social engineering.
    Regular backups are crucial to avoid paying ransom.
  • Fingerprint Scan:
    • Advantages:
    • Very high accuracy
    • Easy to use
    • Requires relatively small storage
    • Disadvantages:
    • Intrusive for some
    • Vulnerable to skin damage
  • Signature Recognition:
    • Advantages:
    • Non-intrusive
    • Quick verification
    • Low-cost
    • Disadvantages:
    • Inconsistent signatures
    • High error rate
  • Retina Scan:
    • Advantages:
    • Very high accuracy
    • Cannot be replicated
    • Disadvantages:
    • Intrusive
    • Slow verification
    • Expensive setup
  • Iris Recognition:
    • Advantages:
    • Very high accuracy
    • Fast verification
    • Disadvantages:
    • Intrusive
    • Requires significant memory
    • Expensive setup
  • Face Recognition:
    • Advantages:
    • Non-intrusive
    • Inexpensive
    • Disadvantages:
    • Affected by lighting and appearance changes
  • Voice Recognition:
    • Advantages:
    • Non-intrusive
    • Fast verification
    • Relatively inexpensive
    • Disadvantages:
    • Vulnerable to recording
    • Low accuracy, susceptible to illness-induced voice changes
  • Digital Certificates:
    • Advantages:
    • High accuracy
    • Easy to use
    • Small storage requirements
    • Disadvantages:
    • Some find it intrusive
    • Can make mistakes if damaged
    • Inconsistent signatures
    • Vulnerable to voice recording
  • Encryption:
    • Protects data from illegal access
    • Uses encryption and decryption keys
    • Applied in emails, cloud storage, and data transfer
  • Firewalls:
    • Filter incoming and outgoing network traffic
    • Prevent unauthorized access
    • Can be hardware or software-based
  • Two-factor Authentication:
    • Requires two methods of authentication
    • Commonly used in online purchases
    • Enhances security with something user knows and something user has
  • User IDs and Passwords:
    • Used to restrict access to data/systems
    • Should be hard to break, changed frequently
    • Combines username and password for access control
    • Additional measures include encryption, anti-spyware software, and limited login attempts.