Save
Ict Revision
Chapter 8
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Janai Chatiza
Visit profile
Cards (35)
Health risks
Risks to
health
when using the
internet
Health risks
Back and neck pain
Repetitive strain injury
(
RSI
)
Eye strain
Headaches
Ozone irritation
Preventing back and neck pain
1. Using adjustable
chairs
2. Using adjustable
screens
Preventing repetitive strain injury (RSI)
1. Taking regular
breaks
2. Using special
keyboards
and
mouses
3. Using
voice activated software
Preventing eye strain
1. Using a less
flickering
screen
2. Using an
anti-glare
screen
Preventing headaches
1. Keeping
distance
between eyes and screen
2. Fixing
lighting
3. Using a
filter
monitor or
glasses
Preventing
ozone
irritation
1. Using proper ventilation
2. Using an inkjet printer
3. Housing the laser printer in a separate room
Safety risks
Risks to
safety
when using the
internet
Safety risks
Electrocution
Trailing
wires
Heavy
equipment falling
Electrical
over-surge
Preventing electrocution
1. Using a
residual
current
breaker
(RCB)
2.
Avoiding
drinks near the computer
3. Checking wire
insulation
Preventing trailing wires
1. Using
wireless
connections
2.
Organizing
and
tucking
wires
Preventing
heavy equipment falling
1. Using
strong desks
2.
Placing equipment
in
the middle
Preventing electrical over-surge
1. Using
low voltage devices
2. Not
overloading sockets
safety
Safety
when using the
internet
Personal data
Any data concerning a person which can be used to
identify
them
Types of personal data
Sensitive data
(ethnic group, political view, religion, criminal activity)
Hacking
Gaining
unauthorized
access to a computer system
Preventing hacking
1. Using
firewalls
2. Using strong
passwords
3. Using intrusion detecting
software
Phishing
Sending a legitimate looking email with an attachment or link to redirect to a
bogus
website
Smishing
SMS
phishing
Vishing
Voicemail phishing
Farming
Installing
malicious code
on a user's computer or
web server
to redirect them to a fake website
Preventing
farming
1. Using
anti-spyware
software
2. Being
alert
Spyware and
keylogging
software
Software that gathers data by
monitoring
keyboard inputs
Preventing
spyware
and
keylogging
1. Using
anti-spyware
software
2. Using
touchscreen
technology
Malware types
Viruses
Spam
Cookies
Viruses
Program code that can
replicate
itself to
delete
or corrupt files
Preventing viruses
1. Installing
anti-virus
software
2. Being
cautious
when opening
unknown
sources
3.
Avoiding
unknown senders
Spam
Unwanted
emails
sent in
bulk
Preventing spam
1. Using a
spam
email
filter
2.
Avoiding
signing up for
mailing
lists
3. Unsubscribing from unknown
mailing
lists
Cookies
Small files or codes stored on a user's computer to form an
anonymous
user profile
Firewall
Software or hardware that checks incoming and
outgoing traffic
and warns of potential
threats
SSL
(
Secure Socket Layer
)
Allows data to be
sent
and received securely over the
internet
TLS
(Transport Layer Security)
Similar to
SSL
, provides
encryption
, authenticity and data integrity
Encryption
Protecting data against
hacking
or illegal access by making it
meaningless