Chapter 8

Cards (35)

  • Health risks
    Risks to health when using the internet
  • Health risks

    • Back and neck pain
    • Repetitive strain injury (RSI)
    • Eye strain
    • Headaches
    • Ozone irritation
  • Preventing back and neck pain
    1. Using adjustable chairs
    2. Using adjustable screens
  • Preventing repetitive strain injury (RSI)
    1. Taking regular breaks
    2. Using special keyboards and mouses
    3. Using voice activated software
  • Preventing eye strain
    1. Using a less flickering screen
    2. Using an anti-glare screen
  • Preventing headaches
    1. Keeping distance between eyes and screen
    2. Fixing lighting
    3. Using a filter monitor or glasses
  • Preventing ozone irritation

    1. Using proper ventilation
    2. Using an inkjet printer
    3. Housing the laser printer in a separate room
  • Safety risks
    Risks to safety when using the internet
  • Safety risks
    • Electrocution
    • Trailing wires
    • Heavy equipment falling
    • Electrical over-surge
  • Preventing electrocution
    1. Using a residual current breaker (RCB)
    2. Avoiding drinks near the computer
    3. Checking wire insulation
  • Preventing trailing wires
    1. Using wireless connections
    2. Organizing and tucking wires
  • Preventing heavy equipment falling

    1. Using strong desks
    2. Placing equipment in the middle
  • Preventing electrical over-surge
    1. Using low voltage devices
    2. Not overloading sockets
    1. safety
    Safety when using the internet
  • Personal data
    Any data concerning a person which can be used to identify them
  • Types of personal data
    • Sensitive data (ethnic group, political view, religion, criminal activity)
  • Hacking
    Gaining unauthorized access to a computer system
  • Preventing hacking
    1. Using firewalls
    2. Using strong passwords
    3. Using intrusion detecting software
  • Phishing
    Sending a legitimate looking email with an attachment or link to redirect to a bogus website
  • Smishing
    SMS phishing
  • Vishing
    Voicemail phishing
  • Farming
    Installing malicious code on a user's computer or web server to redirect them to a fake website
  • Preventing farming
    1. Using anti-spyware software
    2. Being alert
  • Spyware and keylogging software

    Software that gathers data by monitoring keyboard inputs
  • Preventing spyware and keylogging
    1. Using anti-spyware software
    2. Using touchscreen technology
  • Malware types
    • Viruses
    • Spam
    • Cookies
  • Viruses
    Program code that can replicate itself to delete or corrupt files
  • Preventing viruses
    1. Installing anti-virus software
    2. Being cautious when opening unknown sources
    3. Avoiding unknown senders
  • Spam
    Unwanted emails sent in bulk
  • Preventing spam
    1. Using a spam email filter
    2. Avoiding signing up for mailing lists
    3. Unsubscribing from unknown mailing lists
  • Cookies
    Small files or codes stored on a user's computer to form an anonymous user profile
  • Firewall
    Software or hardware that checks incoming and outgoing traffic and warns of potential threats
  • SSL (Secure Socket Layer)

    Allows data to be sent and received securely over the internet
  • TLS (Transport Layer Security)

    Similar to SSL, provides encryption, authenticity and data integrity
  • Encryption
    Protecting data against hacking or illegal access by making it meaningless