safety while using ict tools.ludan awad.pptx

HamadShahidHussain 45 views 22 slides Sep 01, 2025
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

computer science ict


Slide Content

Safety while using ict tools By : ludan awad - 11 international

Health aspects while using computers If we use a computer for many hours (as people often do at work), there are some health issues that might affect us... Eye-Strain One health issue that can occur after using computers for a long time is  eye-strain  (tiredness of the eyes).  This is caused by looking at a  monitor  which is a  constant distance  away. The muscles that focus your eyes do not move, and so get  tired  and  painful . Eye-strain can also cause  headaches . This problem can be solved: Look away  from the monitor at  regular intervals  – re-focus on distant or close objects to exercise the muscles in the eye. Take regular breaks . Use an  anti-glare filter  in front of the monitor to cut down on screen reflections that can also tire the eyes. Back and Neck Ache Many people suffer from  back and neck pain  after working at a computer for a long time. This is usually due to them having a  bad sitting posture . This problem can be solved:  Use an  adjustable, ergonomic chair , and take the time to s et it up properly .  The computer  keyboard  and  monitor  should be at the  correct height  for the seated person (keyboard lower than the elbow, top of monitor at eye level). Take regular breaks : get up, walk around, stretch your muscles

Repetitive Strain Injury (RSI) in Wrists and Hands Any  repetitive  movement (same movement over and over again) can result in a health problem called  repetitive strain injury  (RSI).  In particular,  typing  and using a  mouse  for long periods are common causes of  RSI  in the  wrist  (it is often called carpal-tunnel syndrome). This problem can be solved:  Use a  wrist-rest  to support the wrists while typing and when using the mouse. Take regular breaks  from typing or using the mouse.

safety aspects while using computer  You wouldn't imagine that using computers could be dangerous, but there are a few situations that can result in accidents... Trailing Cables : Computer equipment is often connected to lots of  cables : power, network, etc. If these cables are laying on the floor, they can cause people to  trip  over them Solution: Place cables inside  cable ducts , or  under the carpet  / flooring Spilt Drinks or Food : If any  liquids  are  spilt  on electrical equipment, such a s a computer, it can result in  damage  to the equipment, or an  electric shock  to the user. Solution: Keep drinks and food  away  from computers Overloaded Power Sockets : Plugging  too many power cables  into a socket can result in the socket being  overloaded , overheating, and a  fire starting . Solution: Never plug  too many cables  into a socket. Always make sure there are  fire extinguishers  nearby Heavy Objects Falling : Many items of computer equipment are very  heavy : CRT monitors, laser printers, etc. Heavy items can cause serious injury if they fall on people. Solution: Make sure equipment is placed on  strong tables  / shelves

E-safety E-safety is all about knowing how to use the internet  safely . This includes keeping your personal information private in  chat rooms ,  social media ,  emails  and when playing  online games . Understanding e-safety can help  protect  us from online dangers.  Playing games over the internet is known as ' online gaming '. There are literally  millions  of online gamers and most games allow them to  communicate  with each other in game. This can lead to  similar dangers  as in chat rooms, social media sites and emails. Precautions  you should take when playing online games are listed below: Never reveal personal information -  including real name, home address and phone number Use a nickname as your game name -  instead of using your real name in the game, use a made up one Play online games that use anti-virus/anti-spyware software -  this helps prevent identity theft Know how to block people in the game -  many online games allow you to block other users who send inappropriate messages  Report unwanted users -  many online games have facilities for you to report abusive gamers. This can lead to them being banned from the game.

How can you use the internet safely? As we discussed above, the internet is full of potential dangers but fortunately these are  easy to avoid  by taking certain precautions.  Precautions  you should take when using the internet are listed below: Never reveal personal information -  including name, home address, phone number and photograph  Only use web sites recommended by teachers or parents Use search engines and web sites with filters so that inappropriate content can be filtered out Only open emails from people you know Only open email attachments from people you know Only accept social media friend requests from people you know Use the privacy controls on social media -  this will minimise the number of people who can read your posts  Never arrange to face-to-face meet people that you have met online -  if you do, then take an adult with you and meet in a public place  Make sure that your parents know what you are doing online -  this includes using social media and chat rooms Know how to block people on social media and in chat rooms -  block people who send unwanted messages/content  Report unwanted users -  contact the owners of a chat room or social media site if you receive inappropriate attention from other users  Never post or email pictures of yourself in school uniform Never give out the name of your school .

Hacking What is Hacking? The word 'hacking' has several meanings, but in the context of ICT, it is normally taken to mean  breaking in to a computer system . Why Do Hackers Hack? A hacker may break into a system just out of curiosity or for the challenge - can they get through the system’s defences? But, it is more likely that they are breaking in to  access data , usually because the data has  value . For example, if a hacker enters your computer and steals  financial information  such as your credit card number, or the password to your bank account, they could use that information to make purchases.  If a lot of  information about you  is stolen, a hacker could use this to  impersonate  you on-line. They might apply for new credit cards, take out bank loans, buy cars, etc. all in your name.  This is known as  identity theft . Can a Computer be Protected from Hacking? Just as in the real world, there is no guaranteed way to stop someone breaking into a building (you can make it very difficult, but every security system has its weaknesses), there is also no  guaranteed  way to stop someone breaking into a computer system.  However, you can make it  difficult  enough so that a hacker  moves on  and looks for an easier target. You should: Use  strong passwords  to protect your user login account Never reveal your login password  to anyone else Place a  firewall  between your computer and any network Disconnect  from networks when you are not using them Encrypt  any sensitive information (just in case they get in)

Pharming Pharming is a scam in which malicious code is installed on a computer hard disk or a server This code can misdirect users to fraudulent websites without their knowledge Phishing requires an email to be sent to every person who has been targeted, while pharming does not require emails to be sent out to anyone Pharming can target a larger group of people more easily How pharming works: A hacker will infect the computer with a virus, either by sending an email or installing software on their computer when they first visit their website Once infected, the virus sends user to a fake website that looks identical to the one they wanted to visit Personal info. From the user’s computer can be picked up by the pharmer / hacker Anti-spyware, anti-virus software or anti-pharming software can be used to identify this code and correct the corruption

Phishing Phishing is a fraudulent operation involving the use of emails The creator sends out a legitimate looking email hoping to gather personal and financial information from the recipient of the email The message appears to be from a legitimate source(e.g. a famous bank) When the user clicks on the link they are sent to a spoof website They will be asked for personal info e.g. credit card details, PINs This could lead to identity theft ISPs attempt to filter out phishing emails

Smishing An attempt to extract a user’s confidential information via SMS (short message service) by tricking the user into downloading a Trojan horse (a virus that masks itself). It is phishing via SMS. Preventing Phishing, Pharming & Smishing User education Set up anti-malware and anti-spyware software Enabling protocols such as SPF and DKIM Do not download random .exe (executable file formats),.php, .bat, .com etc. Users should when being redirected to other websites. Therefore, technology enables unauthorised users to gain access to otherwise inaccessible information. If a person on the internet is asking for personal information, or to meet in real life or acting suspicious, they should be reported to cyber security agencies, or one’s parents/guardians. Websites/pop-ups can be made to mimic legitimate ones, or seem too good to be true, for e.g. lotrei.net instead of lottery.com

Vishing Vishing  is short for  voice mail phishing , but instead of receiving an email you receive a voice message that appears to be from a legitimate organisation such as a bank. The caller tries to trick you into calling a number and providing confidential information that can be used to extract confidential information such as usernames and passwords, credit card details etc.

Spams Spam is electronic junk mail and is a type of advertising from a company sent out to a target mailing list Harmless but can clog up networks and slow them down It is more of a nuisance than a security risk Many ISPs are good at filtering out spam, and prevent the user from getting these spam emails. It is often necessary to put a legitimate email address into a contact list to ensure wanted emails are not filtered out by mistake

Cookies A cookie is a small text file that is stored on your computer when you visit some websites. A cookie is used to remember settings from your last visit to a website. For example Amazon use cookies to help identify you when you revisit the site. The website reads the cookie and can then look up details such as you name, address, credit card number from their database. This saves you from having to re-enter your data every time you visit.

Firewalls A firewall is a  device , or a piece of  software  that is placed between your computer and the rest of the network (where the hackers are!)  If you wish to  protect  your whole LAN from  hackers  out on the Internet, you would place a firewall  between the LAN and the Internet connection . A firewall  blocks unauthorised connections  being made to your computer or LAN. Normal data is allowed through the firewall (e.g. e-mails or web pages) but all other data is blocked.

difference between SSL and TSL  Secure Socket Layer  (SSL) :  It is a computing protocol that ensures the security of data sent via the Internet by using encryption. Transport Layer Security  (TLS) :  It is a more effective version of its predecessor, SSL. TLS is designed to prevent third party hacking when a website is communicating with a client.

session cache The WebSEAL session cache stores information about all sessions established by authenticated and unauthenticated users. The session key, stored with the client, is a locator index to the associated session data stored in the WebSEAL session cache.  The WebSEAL session cache stores, among other data, the credential information obtained for each client. Credential information is cached to eliminate repetitive queries to the user registry database during authorization checks.

Spyware Software designed to collect information about what you are doing on the computer. For example a 'key logger' is a type of spyware that monitors and stores a record of every keystroke made on the computer. This data may then be sent to a remote server without your knowledge. Used to harvest passwords. Spyware may be installed without your knowledge by downloading some shareware or other software that does seems to something useful e.g. a free game or utility. Computer security software normally includes an anti-spyware section to help detect these malicious programmes.

Encryption and Decryption also explain plain text and cypher text  Encryption:  It is information or data in the form of a code, to prevent unauthorized access. There is a decryption key that can be used by the sender and the receiver (only if the sender sends him the key) to make sense of the encrypted data that is otherwise meaningless. Symmetric: Only one key is needed to decrypt the message. While transmitting the key to the receiver by the sender, there is a risk that a hacker might interpret the message and then use the key for malicious intents Asymmetric: There is a public key and a private key. The public key is made available to everyone, whereas only the computer user knows the private key. The data is then encrypted using a ’hashing algorithm’.

what are the methods of authentication  These are ways of a computer user proving who they are. For example in banking you would have something you know - e.g. PIN/Password something belonging to you - e.g. bank card In the future a third feature will be introduced: something unique to you - e.g. your fingerprints

what is cloud security? Cloud security, also known as cloud computing security, consists of a set of policies, controls, procedures and technologies that work together to protect cloud-based systems, data, and infrastructure. These security measures are configured to protect cloud data, support regulatory compliance and protect customers' privacy as well as setting authentication rules for individual users and devices. From authenticating access to filtering traffic, cloud security can be configured to the exact needs of the business. And because these rules can be configured and managed in one place, administration overheads are reduced and IT teams empowered to focus on other areas of the business.

Data security VS data loss Data security refers to the process of protecting data from unauthorised access and data corruption throughout its lifecycle. Data security includ es data encryption , h ashing, and key management practices that protect data across all applications and platforms. Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization. Data loss is similar to a data breach, in that data is compromised. However, in a data breach  , data is usually unharmed but in the wrong hands. Data loss can occur in a data breach, but the data itself is destroyed.

Thank you ♡︎
Tags