Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
24 views7 pages

Chapter 8

The document outlines safety and security measures related to ICT devices, emphasizing the risks of electrocution, fire, trailing cables, and heavy falling equipment, along with prevention strategies. It also discusses data protection laws, including the Data Protection Act and GDPR, highlighting the importance of safeguarding personal data and promoting responsible online behavior. Additionally, it covers various threats to data security, such as hacking and phishing, and suggests protective measures like encryption, firewalls, and two-factor authentication.

Uploaded by

iamishan369
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views7 pages

Chapter 8

The document outlines safety and security measures related to ICT devices, emphasizing the risks of electrocution, fire, trailing cables, and heavy falling equipment, along with prevention strategies. It also discusses data protection laws, including the Data Protection Act and GDPR, highlighting the importance of safeguarding personal data and promoting responsible online behavior. Additionally, it covers various threats to data security, such as hacking and phishing, and suggests protective measures like encryption, firewalls, and two-factor authentication.

Uploaded by

iamishan369
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Safety & Security

Physical Safety

1. Electrocution: ICT devices require electrical power to charge or run; the electrical
device can cause electrocution, caused by the electric current moving through a body,
causing fatal injuries and/or death.

There are multiple causes for electrocution, including:

• Contact between liquid substances and electronic devices: Keep liquids


away from electrical equipment.

• Open cables: Ensure that cables are entirely insulated and packed, and use
circuit breakers or fuses to prevent electrical overload.

2. Fire: ICT devices require electricity to charge or run; too many devices using a single
socket can cause the plug socket to overload, and heat is generated by too much
electricity, causing the wiring to degrade and ignite a fire.

The causes and reduction tactics for fire include:

• Socket overload: Ensure enough plug sockets in the room, don’t plug too many
devices into the same socket, and don’t leave devices plugged in and
unattended.

• Overheated equipment: Ensure that equipment is properly ventilated and not


obstructed, keep flammable materials away from heat sources, regularly check
equipment for signs of wear or damage, use fire extinguishers in case of
emergencies, turn off or unplug devices when away from the location, do not
cover any air vents on devices.

3. Trailing cables: Devices can be plugged in using cables. Cables that are protruding
can cause an accident; you can trip over a cable left out in a location, and body damage
can occur during a fall, for example, breaking bones, ligament damage, bruising,
sprains, etc. depending on the area fell on

Trailing cables causes and prevention strategies:

• Unorganized/insecure cables: use cable ties to secure cables, keep cables


packed correctly in, let’s say, a table, therefore not coming in the way of walking
paths, use wireless devices where possible, and regularly inspect cables for
signs of wear or damage.
4. Heavy falling equipment: Devices have varying levels of weight, and if a device falls
on you, it could cause injury; any device should be placed in a secure location, like a PC
on a solid desk and not near the edge.

Causes and reduction tactics for falling equipment:

• Improperly secured equipment: Ensure that equipment is properly secured


and stable. Regularly check the stability of locations containing devices.

• Equipment on unstable surfaces: Keep equipment away from edges and other
potential hazards, and regularly inspect equipment and locations containing
devices for signs of wear or damage.

eSafety

Data Protection

The Data Protection Act (DPA) controls personal data collection, storage and
processing.

• In the UK, the European Union’s General Data Protection Regulation (GDPR)

• Protects personal data, whether stored on paper or a computer system

Principles of the Data Protection Act

• Data must be processed lawfully, fairly, and transparently, with clear consent
from the individual.

• Data should only be collected for specific, explicit, and legitimate purposes.

• Organizations should only collect and retain the minimum personal data
necessary for their stated purpose.

• Data should be accurate and up-to-date, and reasonable steps must be taken to
rectify or erase inaccurate information.

• Personal data should not be kept longer than necessary and should be securely
deleted when no longer needed.

• Organizations must protect personal data against unauthorized or unlawful


processing, accidental loss, destruction, or damage.

Why is data protection legislation required?

• Protecting Individual Rights: Data protection legislation safeguards individuals'


right to privacy and control over their personal information.

• Preventing Misuse of Personal Data: It helps prevent unauthorized access,


identity theft, fraud, and other forms of data misuse.
• Promoting Trust: Data protection laws build trust between individuals and
organizations by ensuring their personal information is handled responsibly.

• Encouraging Responsible Data Handling: Legislation promotes responsible


data collection, storage, and processing practices among organizations.

• Enabling Data Subject Rights: Legislation grants individuals rights such as


access to their data, right to rectification, erasure, and objection to processing.

Personal Data

• Refers to information that can be used to identify an individual

• Examples

o Personal Name

o Address

o Date of birth

o A photograph in school uniform

o Medical history

• Threats that can be avoided by protecting personal data:

o Identity theft

o Privacy breaches

o Misuse of the information

o Data be sold to third-party companies

o Individuals could be held to ransom over personal data gathered

o could be used to commit a physical crime

• How to avoid inappropriate data disclosure:

o Personal data must be kept confidential and protected through privacy


settings on websites such as social media or strong passwords on
websites where personal data is held or used

o Access to personal data should be limited to authorized individuals

o Think before you post - consider what information could be gathered from
your image or content

o Check website details about the collection, storage, and use of personal
data
o Only access websites where personal data is used or viewed when on a
secure, encrypted connection

eSafety

• E-safety is knowing about and using the internet safely and responsibly.

• It refers to when an individual is using the internet, email, social media, or online
gaming.

• E-safety refers to the individual knowing how to protect themselves from


potential dangers and threats.

The Need for eSafety

• Awareness that personal information should not be shared freely

• Awareness of how to act online and avoid falling victim creates a safe and
respectful environment.

• Identify and avoid online scams, phishing attempts, and fraudulent websites that
may try to trick them into sharing personal or financial information.

• Mindful of online behaviour and interactions, protecting your digital reputation,


which can have long-term consequences in your personal and professional life.

• Control privacy settings on social media platforms, limiting who can access/view
personal information and posts.

• Avoid encountering explicit or harmful content online, reducing the risk of


exposure to inappropriate material or online predators.

• Engage in online gaming responsibly, avoid sharing personal details, and behave
respectfully towards other players.

• Protecting devices from malware, viruses, and other online threats, preventing
data loss, privacy breaches, or device damage.

• Develop responsible online behaviours, promoting respectful conduct while


interacting with others online.

• Maintain a healthy balance between online and offline lives, reducing the risk of
addiction, mental health issues, or negative impacts on relationships and self-
esteem.

Safety Suggestions

• The internet:

o Use trusted websites recommended by teachers or reputable sources


o Utilize search engines that only allow access to age-appropriate websites
and use filters to ensure inappropriate content is not seen

o Never reveal personal information

• Email:

o Be aware of the potential dangers of opening or replying to emails from


unknown people, including attachments; potential dangers include
phishing, spam

o Ensure you know who the email is for when considering sending personal
data or images via email, only with people you know and not with
identifiable content like school photos

• Social media:

o Know how to block and report people who send content or messages that
are unwanted

o Know where the privacy settings are to reduce the number of people who
can see your posts or images

o Be aware of the potential dangers of meeting online contacts face to face;


do not meet anyone you do not know; if you do, take an adult and meet
publicly.

o Do not distribute inappropriate images and inappropriate language

o Respect the confidentiality of personal data belonging to other people

o Only accept friend requests from people you know

o Parents should be aware of what you are doing online, discuss what you
are doing online

o Do not post images or details that can be used to locate you

• Online gaming:

o Do not use real names as usernames

o Never share personal or financial details with other players

o Know how to block and report players for inappropriate messages or


comments

• Sensitive Data is data that might result in loss of an advantage or level of


security if disclosed to others. I.e., ethnicity, religion, criminal record, etc. At the
same time, personal data can be used to identify the user, i.e., passport number,
name, age, etc.

Security of Data

Threats

There are multiple methods by which data can be threatened, including:

• Hacking: Unauthorized access to computer systems or networks to gain control,


steal information, or cause damage, thus leading to identity theft, privacy
breaches, and misuse of data

• Phishing: Deceptive emails or messages that are received from trusted sources
to trick individuals into revealing personal data

• Pharming: Manipulation of DNS (Domain Name System) to redirect users to


fraudulent websites, often to steal personal data

• Smishing: Phishing attacks carried out through SMS or text messages

• Vishing: (aka voicemail phishing) Phishing attacks carried out through voice
messages to trick users into calling the telephone number contained in the
message

• Viruses and malware: Viruses are program codes that can replicate/copy
themselves to cause data loss or corruption. Malicious software designed to
disrupt, damage, or gain unauthorised access to computer systems or networks

• Card fraud: Unauthorized use of credit or debit card information for fraudulent
purposes caused by shoulder surfing, card cloning, or keylogging.

Protection of Data

Multiple techniques are implied for the protection of data, inclusive:

1. Biometrics:

• Individuals' distinctive physical or behavioural traits, such as fingerprints, faces,


or irises, can be used for access control and verification. Since biometric data is
hard to fake or duplicate, it offers a more secure form of identification.

2. Digital certificate:

• A digital record that attests to a website's reliability and integrity. A digital


certificate is used to provide safe communication and to build confidence
between parties. Identifier data, the entity's public key, and a third party's digital
signature are frequently found in digital certificates.

3. Secure Socket Layer (SSL):


• A protocol that creates a secure connection between a client computer and a
server. SSL ensures that information communicated between a server and client
stays private and cannot be intercepted or changed by unauthorized parties. A
website's identification for it is the S at the end of HTTP.

4. Encryption:

• It is creating data in a format that cannot be read without a decryption key. Data
on hard drives, emails, cloud storage, and secure websites (HTTPS) are all
protected by encryption. Without a decryption key, it assures that even if
unauthorized people obtain data, it cannot be decoded.

5. Firewall:

• A firewall is a network security device that monitors and manages incoming and
outgoing network traffic. Its goal is to separate an internal network from other
networks by filtering data according to established criteria. It assists in
preventing malware, unauthorized access, and other network risks.

6. Two-factor authentication:

• A security mechanism that requests two different kinds of identification from


users to confirm their identity. To provide additional protection outside of just a
username and password, 2FA was created. Typically, it combines something that
uniquely identifies a user, like biometric data, with something the user has, like a
smartphone and a token or something they know, like a password.

7. User ID and password:

• A typical authentication technique uses a password plus a secret code (user ID)
to identify. To strengthen data security, user IDs and passwords restrict access to
only authorized users. Using secure passwords and changing them frequently is
critical to ensure security. When creating passwords, it is advised to utilize a mix
of uppercase, lowercase, digits, and special characters.

You might also like