Safety while using ict tools By : ludan awad - 11 international
Health aspects while using computers If we use a computer for many hours (as people often do at work), there are some health issues that might affect us... Eye-Strain One health issue that can occur after using computers for a long time is eye-strain (tiredness of the eyes). This is caused by looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move, and so get tired and painful . Eye-strain can also cause headaches . This problem can be solved: Look away from the monitor at regular intervals – re-focus on distant or close objects to exercise the muscles in the eye. Take regular breaks . Use an anti-glare filter in front of the monitor to cut down on screen reflections that can also tire the eyes. Back and Neck Ache Many people suffer from back and neck pain after working at a computer for a long time. This is usually due to them having a bad sitting posture . This problem can be solved: Use an adjustable, ergonomic chair , and take the time to s et it up properly . The computer keyboard and monitor should be at the correct height for the seated person (keyboard lower than the elbow, top of monitor at eye level). Take regular breaks : get up, walk around, stretch your muscles
Repetitive Strain Injury (RSI) in Wrists and Hands Any repetitive movement (same movement over and over again) can result in a health problem called repetitive strain injury (RSI). In particular, typing and using a mouse for long periods are common causes of RSI in the wrist (it is often called carpal-tunnel syndrome). This problem can be solved: Use a wrist-rest to support the wrists while typing and when using the mouse. Take regular breaks from typing or using the mouse.
safety aspects while using computer You wouldn't imagine that using computers could be dangerous, but there are a few situations that can result in accidents... Trailing Cables : Computer equipment is often connected to lots of cables : power, network, etc. If these cables are laying on the floor, they can cause people to trip over them Solution: Place cables inside cable ducts , or under the carpet / flooring Spilt Drinks or Food : If any liquids are spilt on electrical equipment, such a s a computer, it can result in damage to the equipment, or an electric shock to the user. Solution: Keep drinks and food away from computers Overloaded Power Sockets : Plugging too many power cables into a socket can result in the socket being overloaded , overheating, and a fire starting . Solution: Never plug too many cables into a socket. Always make sure there are fire extinguishers nearby Heavy Objects Falling : Many items of computer equipment are very heavy : CRT monitors, laser printers, etc. Heavy items can cause serious injury if they fall on people. Solution: Make sure equipment is placed on strong tables / shelves
E-safety E-safety is all about knowing how to use the internet safely . This includes keeping your personal information private in chat rooms , social media , emails and when playing online games . Understanding e-safety can help protect us from online dangers. Playing games over the internet is known as ' online gaming '. There are literally millions of online gamers and most games allow them to communicate with each other in game. This can lead to similar dangers as in chat rooms, social media sites and emails. Precautions you should take when playing online games are listed below: Never reveal personal information - including real name, home address and phone number Use a nickname as your game name - instead of using your real name in the game, use a made up one Play online games that use anti-virus/anti-spyware software - this helps prevent identity theft Know how to block people in the game - many online games allow you to block other users who send inappropriate messages Report unwanted users - many online games have facilities for you to report abusive gamers. This can lead to them being banned from the game.
How can you use the internet safely? As we discussed above, the internet is full of potential dangers but fortunately these are easy to avoid by taking certain precautions. Precautions you should take when using the internet are listed below: Never reveal personal information - including name, home address, phone number and photograph Only use web sites recommended by teachers or parents Use search engines and web sites with filters so that inappropriate content can be filtered out Only open emails from people you know Only open email attachments from people you know Only accept social media friend requests from people you know Use the privacy controls on social media - this will minimise the number of people who can read your posts Never arrange to face-to-face meet people that you have met online - if you do, then take an adult with you and meet in a public place Make sure that your parents know what you are doing online - this includes using social media and chat rooms Know how to block people on social media and in chat rooms - block people who send unwanted messages/content Report unwanted users - contact the owners of a chat room or social media site if you receive inappropriate attention from other users Never post or email pictures of yourself in school uniform Never give out the name of your school .
Hacking What is Hacking? The word 'hacking' has several meanings, but in the context of ICT, it is normally taken to mean breaking in to a computer system . Why Do Hackers Hack? A hacker may break into a system just out of curiosity or for the challenge - can they get through the system’s defences? But, it is more likely that they are breaking in to access data , usually because the data has value . For example, if a hacker enters your computer and steals financial information such as your credit card number, or the password to your bank account, they could use that information to make purchases. If a lot of information about you is stolen, a hacker could use this to impersonate you on-line. They might apply for new credit cards, take out bank loans, buy cars, etc. all in your name. This is known as identity theft . Can a Computer be Protected from Hacking? Just as in the real world, there is no guaranteed way to stop someone breaking into a building (you can make it very difficult, but every security system has its weaknesses), there is also no guaranteed way to stop someone breaking into a computer system. However, you can make it difficult enough so that a hacker moves on and looks for an easier target. You should: Use strong passwords to protect your user login account Never reveal your login password to anyone else Place a firewall between your computer and any network Disconnect from networks when you are not using them Encrypt any sensitive information (just in case they get in)
Pharming Pharming is a scam in which malicious code is installed on a computer hard disk or a server This code can misdirect users to fraudulent websites without their knowledge Phishing requires an email to be sent to every person who has been targeted, while pharming does not require emails to be sent out to anyone Pharming can target a larger group of people more easily How pharming works: A hacker will infect the computer with a virus, either by sending an email or installing software on their computer when they first visit their website Once infected, the virus sends user to a fake website that looks identical to the one they wanted to visit Personal info. From the user’s computer can be picked up by the pharmer / hacker Anti-spyware, anti-virus software or anti-pharming software can be used to identify this code and correct the corruption
Phishing Phishing is a fraudulent operation involving the use of emails The creator sends out a legitimate looking email hoping to gather personal and financial information from the recipient of the email The message appears to be from a legitimate source(e.g. a famous bank) When the user clicks on the link they are sent to a spoof website They will be asked for personal info e.g. credit card details, PINs This could lead to identity theft ISPs attempt to filter out phishing emails
Smishing An attempt to extract a user’s confidential information via SMS (short message service) by tricking the user into downloading a Trojan horse (a virus that masks itself). It is phishing via SMS. Preventing Phishing, Pharming & Smishing User education Set up anti-malware and anti-spyware software Enabling protocols such as SPF and DKIM Do not download random .exe (executable file formats),.php, .bat, .com etc. Users should when being redirected to other websites. Therefore, technology enables unauthorised users to gain access to otherwise inaccessible information. If a person on the internet is asking for personal information, or to meet in real life or acting suspicious, they should be reported to cyber security agencies, or one’s parents/guardians. Websites/pop-ups can be made to mimic legitimate ones, or seem too good to be true, for e.g. lotrei.net instead of lottery.com
Vishing Vishing is short for voice mail phishing , but instead of receiving an email you receive a voice message that appears to be from a legitimate organisation such as a bank. The caller tries to trick you into calling a number and providing confidential information that can be used to extract confidential information such as usernames and passwords, credit card details etc.
Spams Spam is electronic junk mail and is a type of advertising from a company sent out to a target mailing list Harmless but can clog up networks and slow them down It is more of a nuisance than a security risk Many ISPs are good at filtering out spam, and prevent the user from getting these spam emails. It is often necessary to put a legitimate email address into a contact list to ensure wanted emails are not filtered out by mistake
Cookies A cookie is a small text file that is stored on your computer when you visit some websites. A cookie is used to remember settings from your last visit to a website. For example Amazon use cookies to help identify you when you revisit the site. The website reads the cookie and can then look up details such as you name, address, credit card number from their database. This saves you from having to re-enter your data every time you visit.
Firewalls A firewall is a device , or a piece of software that is placed between your computer and the rest of the network (where the hackers are!) If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN and the Internet connection . A firewall blocks unauthorised connections being made to your computer or LAN. Normal data is allowed through the firewall (e.g. e-mails or web pages) but all other data is blocked.
difference between SSL and TSL Secure Socket Layer (SSL) : It is a computing protocol that ensures the security of data sent via the Internet by using encryption. Transport Layer Security (TLS) : It is a more effective version of its predecessor, SSL. TLS is designed to prevent third party hacking when a website is communicating with a client.
session cache The WebSEAL session cache stores information about all sessions established by authenticated and unauthenticated users. The session key, stored with the client, is a locator index to the associated session data stored in the WebSEAL session cache. The WebSEAL session cache stores, among other data, the credential information obtained for each client. Credential information is cached to eliminate repetitive queries to the user registry database during authorization checks.
Spyware Software designed to collect information about what you are doing on the computer. For example a 'key logger' is a type of spyware that monitors and stores a record of every keystroke made on the computer. This data may then be sent to a remote server without your knowledge. Used to harvest passwords. Spyware may be installed without your knowledge by downloading some shareware or other software that does seems to something useful e.g. a free game or utility. Computer security software normally includes an anti-spyware section to help detect these malicious programmes.
Encryption and Decryption also explain plain text and cypher text Encryption: It is information or data in the form of a code, to prevent unauthorized access. There is a decryption key that can be used by the sender and the receiver (only if the sender sends him the key) to make sense of the encrypted data that is otherwise meaningless. Symmetric: Only one key is needed to decrypt the message. While transmitting the key to the receiver by the sender, there is a risk that a hacker might interpret the message and then use the key for malicious intents Asymmetric: There is a public key and a private key. The public key is made available to everyone, whereas only the computer user knows the private key. The data is then encrypted using a ’hashing algorithm’.
what are the methods of authentication These are ways of a computer user proving who they are. For example in banking you would have something you know - e.g. PIN/Password something belonging to you - e.g. bank card In the future a third feature will be introduced: something unique to you - e.g. your fingerprints
what is cloud security? Cloud security, also known as cloud computing security, consists of a set of policies, controls, procedures and technologies that work together to protect cloud-based systems, data, and infrastructure. These security measures are configured to protect cloud data, support regulatory compliance and protect customers' privacy as well as setting authentication rules for individual users and devices. From authenticating access to filtering traffic, cloud security can be configured to the exact needs of the business. And because these rules can be configured and managed in one place, administration overheads are reduced and IT teams empowered to focus on other areas of the business.
Data security VS data loss Data security refers to the process of protecting data from unauthorised access and data corruption throughout its lifecycle. Data security includ es data encryption , h ashing, and key management practices that protect data across all applications and platforms. Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization. Data loss is similar to a data breach, in that data is compromised. However, in a data breach , data is usually unharmed but in the wrong hands. Data loss can occur in a data breach, but the data itself is destroyed.