GRADE 10 Introduction To Safety and Security in ICT
GRADE 10 Introduction To Safety and Security in ICT
Computers and their peripherals are electrical devices that need to be connected to each other, and this will involve some cables
and an electricity supply. Add to that the possibility that several computers may be connected by cables in order to create a
network, and suddenly there are a lot of wires around. Simple precautions can be taken to overcome the safety problems that
this can cause.
https://www.youtube.com/watch?v=tPccGU_aCic
https://www.youtube.com/watch?v=MOtXGRqcsvA
Electrical overload
occurs when more electrical current flows through a circuit than it is designed
to handle. This happens when too many devices or appliances are connected
to the same circuit, or when a device draws more power than the circuit's
capacity.
The danger signs are if the plugs or sockets become hot, or fuses blow
unexpectedly; there may be flickering lights or burn marks on sockets or plugs.
If this happens, you should check that there isn't any loose wiring, that only
one extension lead per wall socket is being used and that there isn't one
extension lead plugged into another.
To avoid electrical overload and equipment overheating, you can calculate the
amps being used by dividing the amount of wattage by the voltage.
eSafety eSafety basically means being safe on the internet but it can also
include the safe use of technology
Threats to data
Identity theft is a type of fraud (criminal trick) where personal information is stolen
and used to impersonate a person. This isn't a new problem because in the past,
postal deliveries were intercepted to find out names, addresses and bank account
details. The person committing the fraud could then open a credit card account,
for instance, or apply for a loan in the victim's name. Pretending to be someone
you're not based on another person's details is identity theft.
Hacking Phishing Pharming
Hacking is malicious This is when fraudsters Pharming is similar to phishing,
(intending to do harm) send emails claiming to but a pharming attacker tries to
damage caused by be from a bank or redirect you to a bogus (fake) site
people who get building society e- even when you have typed the
unauthorised access commerce site in order correct web address. This is often
to computer systems. to find out your applied to the websites of banks
People who do this personal and financial or e-commerce sites.
are called hackers. details.
Card fraud
Credit card fraud is a broad term used to describe theft or fraud
that is committed using a payment card, such as a credit card or a
debit card. The purpose of credit card fraud will probably be to
obtain goods without paying, or to steal funds from an account.
Computer viruses and malware
A computer virus is a malicious program designed to harm or disrupt a computer system by
spreading from one device to another.
Trojan Horse – Disguises itself as legitimate software but harms the system once installed.
Worm – Spreads across networks without needing a host file.
Regular C leaning
Keep devices clean and free from dust buildup, which can cause
overheating or hardware failures.
NOTE
Physical safety issues can be solved by using simple strategies to prevent problems occurring.
Evaluate how you use IT equipment and develop ways to minimise any safety risks that you find.
Most countries have data protection legislation for the protection of users' personal data.
Explain what is meant by personal data, why it should be kept confidential and protected and how to avoid
inappropriate disclosure of personal data.
Evaluate your own use of the internet, email, online gaming and social media sites and discuss why eSafety
is needed.
Understand what effective security of data is, as well as what security of data online is, then discuss the
effectiveness of different methods of increasing security.
Understand the threats to data, such as hacking, phishing, pharming, smishing and vishing and how to
prevent them.
Understand and know how to take action against viruses and malware.
Know about credit card fraud, including shoulder surfing, card cloning and key logging.
Know what encryption and SSL are and how to protect data, including using biometric data, digital
certificates, firewalls and user IDs and passwords.
Notes
2. What should you do immediately if you spill a drink into your keyboard or laptop?
1. Turn off the device right away.
2. Unplug it from any power source.
3. Wipe off the liquid carefully and let it dry before trying to turn it back on.
4. What should Ahmed consider before giving personal information on an internet site?
1. Is the website secure? (Check for “https” and a padlock symbol).
2. Is the website asking for more information than needed?
3. Could the information be used to harm her or her identity?
8. Why is it wrong to reply to junk mail asking them not to send more?
- When you reply, it confirms that your email is active, and they might send you even more spam.
10. How could Facebook posts help thieves rob your house?
- Posting about being on vacation or showing off expensive items can tell thieves that your house is empty or has valuables, making it easier
for them to plan a robbery.