0% found this document useful (0 votes)
12 views30 pages

chapter6 Note

Chapter 6 discusses unauthorized access, accidental deletion, and malware, highlighting the risks and types of malware such as viruses, worms, and ransomware. It also covers phishing and pharming, methods of securing data including strong passwords and biometrics, and the importance of anti-malware software. Additionally, the chapter addresses online payment systems, the impact of the internet on employment, and the benefits and drawbacks of remote working.

Uploaded by

Ariful Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views30 pages

chapter6 Note

Chapter 6 discusses unauthorized access, accidental deletion, and malware, highlighting the risks and types of malware such as viruses, worms, and ransomware. It also covers phishing and pharming, methods of securing data including strong passwords and biometrics, and the importance of anti-malware software. Additionally, the chapter addresses online payment systems, the impact of the internet on employment, and the benefits and drawbacks of remote working.

Uploaded by

Ariful Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Chapter 6

Unauthorised access & accidental deletion


What is unauthorised access?
• Unauthorised access is when a usergains access to a network without permission
• Unauthorised access can be the result of:
o direct entry - a user tries to gain access directly by themselves or by by using software
designed to try username and password combinations repeatedly (brute force attack)
o indirect entry - a users tries to gain access indirectly by exploiting vulnerabilities in
software or users
• Some devices are the target of hackers to be used as botnets
• Botnets are groups of computers that are used without an owners knowledge to carry out harmful
activities or spread malware
Accidental deletion
• Accidental deletion of data can occur when a user:
o Presses the wrong key on a keyboard
o Formats media on the wrong device
o Loses power unexpectedly
Malware
What is malware?
• Malware (malicious software) is the term used for any software that has been created with malicious
intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corruptedor encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• There are various types of malware and each has slightly different issues which they cause
Malware What it Does

Virus •
A program which can replicate itself on a user's computer. It contains code that
will cause unwanted and unexpected events to occur
• Examples of issues a user may experience are
o Corrupt files
o Delete data
o Prevent applications from running correctly

Worms •
Worms are very similar to viruses, with the main difference being that they will
spread to other drives and computers on the network
• Worms can infect other computers from
o Infected websites
o Instant message services
o Email
o Network connection

Trojan •
Sometimes also called a Trojan Horse
• Trojans disguisethemselves as legitimate software but contain malicious code in
the background

Spyware •
Software which will allow a person to spy on the users' activitieson their devices
• This form of software will be embedded into other software such as games or
programs that have been downloaded from illegitimate sources
• Spyware can record your screen, log your keystrokes to gain access to passwords
and more

Ransomware •
A form of malware that locks your computer or device and encrypts your
documents and other important files
• Often a demand is made for money to receive the password that will allow the
user to decrypt the files
• There is no guarantee paying the ransom will result in the user getting their data
back
Phishing & pharming
What is a phishing?
• Phishing is a form of social engineering
• It involves sending fraudulent, legitimate-looking emails to a large number of email addresses,
claiming to be from a reputable company or trusted source to try and gain access to your details
• Phishing often tries to coax the user to click on a login button to enter their details
What are the effects of phishing?
• The creator of the email can gain unauthorised access to personal data such as login information,
bank accounts and more
• Phishing can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can phishing be prevented?
• Phishing can be prevented by:
o Anti-spam filters to avoid fraudulent emails arriving in a user's inbox
o Training staff to recognise fraudulent emails and to avoid opening attachments from
unrecognised senders
o User access levels to prevent staff from being able to open files-types such as executable
(.exe) files and batch (.bat) files
What is a pharming?
• Pharming is typing a website address into a browser and it is redirected to a 'fake' website to
trick a user into typing in sensitive information such as passwords
• An attacker attempts to alter DNSsettings or change a users browser settings to redirect users to the
fraudulent website
What are the effects of pharming?
• The creator of the malicious content can gain unauthorised access to personal data such as login
information, bank accounts and more
• Pharming can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can pharming be prevented?
• Pharming can be prevented by:
o Keeping anti-malware software up to date
o Checking URLs regularly
o Make sure the padlock icon is visible

Methods of Securing Data


Passwords, PINs & biometrics
What is a strong password?
• Strong passwords should contain:
o More than eight characters
o A mixture of letters, numbers and symbols
o A mixture of uppercase and lowercase letters
oUncommon words/phrases
• Passwords should be changed regularly
What are biometrics?
• Biometrics are a way of authenticating a user by using their unique human characteristics
• Some of the ways biometrics can be used are:
o Fingerprint scans
o Retina scans
o Facial recognition
Advantages Disadvantages

• •
Unique to the person and can not be can be intrusive, for example, scanning eyes
copied, meaning that the data is always • Scans be not be recognised, an example of
with the person could be fingerprint scans with dirty hands
• Passwords can be easily copied, forgotten, • Very expensive to install
guessed or cracked • Low light can provide an issue for facial
• It is difficult to copy or forge biometric recognition as well as hats and glasses
data • People may be uncomfortable having their
• Eliminates the possibility of attacks such as most unique characteristics being stored in a
shoulder surfing and key-logging software database
• A high degree of accuracy as there is no
known way to copy a person's retina
pattern for example
What is a CAPCHA?
• A CAPCHA is a method of testing if a website request originates from a human or a machine
(bot)
• Completely Automated Public Turing test to tell Computers & Humans Apart (CAPTCHA)
examples include:
o Text - Asking users to enter characters from a distorted text box, users would need to
decipher the characters and enter them in a designated box
o Image - A grid of images, a user would be asked to select all those that contain a specific
object

o Checkbox - A simple checkbox appears asking the user to confirm they are not a robot
• A CAPTCHA can be used to prevent spam and protect logins
Anti-malware
What is anti-malware software?
• Anti-malware software is a term used to describe a combination of different software to prevent
computers from being susceptible to viruses and other malicious software
• The different software anti-malware includes are
o Anti-virus
o Anti-spam
o Anti-spyware
How does anti-malware work?
• Anti-malware scans through emailattachments, websites and downloaded files to search for issues
• Anti-malware software has a list of known malware signatures to blockimmediately if they try to
access your device in any way
• Anti-malware will also perform checks for updates to ensure the database of known issues is up to
date
Access rights
What are access rights?
• Access rights ensure users of a network can access what they need to access and do not have access
to information/resources they shouldn't
• Users can have designated roles on a network
• Access rights can be set based on a user's role, responsibility, or clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without editing or deleting
o No access - this hides the file from the user
• Some examples of different rights of access to a school network could include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but cannot access other staff
members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions
Secure websites
What is HTTP & HTTPS?
• Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website
viewing
• HTTP allows clients to receive datafrom the sever (fetching a webpage) and send data to the server
(submitting a form, uploading a file)
• HTTPS works in the same way as HTTP but with an added layer of security
• All data sent and received using HTTPS is encrypted
• HTTPS is used to protect sensitive information such as passwords, financial information and
personal data

Email safety
What is email safety?
• Users should be aware of the dangers when using email, especially email attachments and web
links
• To ensure users use email safely they should take extra cautionwhen:
o Email is from an unknown sender
o Text is general or impersonal
o Contains spelling, punctuation or grammar mistakes
o Attached files are executable files (.exe)
o Urgency is the tone of the message
o Don't recognise the URL
Backup procedures
What is a backup software?
• Backup software is used to create copies of personal data in order to keep it safe in the event of:
o Accidental loss
o Data theft
• Backups can be automated and scheduled to happen at less busy periods of the day, to not take up
valuable system resources (e.g. overnight etc.)
• Backups can be made in two ways:
o Full - all files are backed up (saftest, slow)
o Incremental - only files that have been added/modified since the last backup are backed up
(faster, less secure)
• Backups can be stored locally (secondary storage) or remotely(cloud)
• Backup software can be purchased or come as a standalone application bundled with an operating
system

Online Payment Systems

Online Payment Systems


What are online payment systems?
• Online payment systems eliminate the need for physical cash by facilitating the payment of good
and services online
• Online payment systems offer:
o Convenience - pay for anything, anytime, from anywhere
o Security - encryption protects sensitive information
o Increased reach - can be used for international transactions
o Transparency - digital records kept for easy monitoring and resolving disputes
• The most common online payment systems include:
o Third party payment processors
o Bank cards
o Contactless (NFC)
Third party payment processors
• Third party payment processors facilitate online payments using an email address as identification
• They can be linked to online shopping applications to make the purchasing process easier & faster
• Popular third party payment processors include:
o PayPal
o Worldpay
o Stripe
Bank cards
• A bank card can be used to pay for good and services online using information found on the card
• When making a purchases, the following information is required:
o 16 digit card number
o Expiry date
o Security number (CVC)
• When choosing to use a bank card online, other financial institutionsmay be used to authenticate
the transaction, such as:
o Visa
o Mastercard
Contactless payments (NFC)
• Contactless payments can be made using near field communication (NFC)
• If a contactless card is in close proximity of a reader requesting a payment then a transaction can
take place
• No extra authentication takes place, but the amount is limited
• Limits are there to deter criminalsas only small amounts can be stolen
How can you protect online payments?
• Online payment systems can be protected using a number of methods such as:
o Banks - monitoring payments and/or analysing spending patterns (if card is
lost/stolen/cloned)
o Encryption for online payments
o Two factor authentication(2FA)
o Using secure websites (HTTPS)
Employment
Impact of the internet on employment
What are the impacts of the internet on employment?
• The three biggest impacts of the internet on employment are:
o change in skills requirements
o new job opportunities
o job losses
Skills requirements
• The demand for tech skills and competence in information communication technology (ICT)
• The ability to work with and analyse more data to make informed business decisions
• A shift in the need for particular skill sets due to more automation means potential employees
need to be adaptable
• A focus on problem solving and critical thinking rather than carrying out tasks that can now be
automated
• An increased importance on soft skills such as:
o Effective communication
o Collaboration
o Lifelong learning
New job opportunities
Job Description

Cyber security •
Skilled works to look after and protect systems
from attack
• Trained to work with computer systems and
networks

Data science •
Experts to analyse data and extract insights
• Programming knowledge

Artificial intelligence (AI) & machine •


learning (ML) Developing AI in all industries
• Working with machine learning algorithms

Digital marketing •
Content creation
• Search engine optimisation (SEO)
• Social media marketing

Cloud computing •
Cloud architects
• Security specialists
Job losses
• Employees who choose to not improve their skills using the internet may unfortunately not have
the skills required to carry out new work
• If they are unwilling to retrain this may lead to job losses
Impact of the internet on working practices
What are working practices?
• Working practices are the ways in which a person goes about completing a task as part of their job
• Examples of working practices include:
o Collaborative working
o Flexible working
Collaborative working
Access to Information

Access to Information
Does the internet give access to more information?
• Yes, the internet gives access to a wealth of information
• Individuals can keep up to date with news, sport and weather information 24 hours a day
• Traditional media such as television and radio have some disadvantages that the internet has solved
Television and radio Internet

Broadcast at set times 24/7 availability

Limited number of channels Millions of channels

Editors decide on content Not always edited

Only available within range of transmitter Access from anywhere with a connection

Limited access to news from other countries More open access, some content is geo-restricted

Held to standard Not always held to any standards


New ways of learning
• The internet has given people access to new ways of learning, such as:
o Virtual learning environments (VLEs) - online support from teachers and students
o Social learning - social media platforms enable learners to share resources, ideas and
projects
o Gamification - making learning engaging and interaction, promoting knowledge retention
o Virtual reality (VR) - immersive experiences, bringing abstract concepts to life
Entertainment & leisure
• The internet has provided users with access to on-demand servicessuch as streaming:
o movies
o television
o music
• Users can access online systems for:
o Travel
o Shopping
o Banking
• Individual users can create webpages and share information around the world, both for
entertainment and more serious issues

Online Working from Home


Availability of digital devices
How has the availability of digital devices changed the way people work?
• Traditionally, workers required access to computer systems and would access them from an office
environment (centralised)
• To facilitate access, office hours such as 09:00 to 17:00 were common
• As digital devices became cheaper and more powerful, these devices were increasingly used at home
• Digital devices can be used to:
o Run a range of software
o Access the internet
o Access online systems & applications
• This has led to opportunities for people to work from home
• This is a decentralised approach
• Using the internet to work from home has benefits and drawbacks for organisations and its
employees
Benefits and drawbacks to organisations
Benefits Drawbacks

Can attract talented, motivated workforce Concerns about data security

Can employee from a wider location More difficult to manage and support employees
(internationally)

No need to buy/rent office space Employees might not work as hard

No commuting for employees (no lateness) Complications with payroll for workers in different
coutries

Workers may work more effectively from home

Benefits and drawbacks to employees


Benefits Drawbacks

No travel to work (less stress, saves money etc.) Distractions at home (family, leisure activities)

More time working/resting, no travelling Lack of social interaction

Work at a time to suit them Feel disconnected from the company

Less distractions

Comfortable environment

Organise work around social or family commitments

No uniform/business clothes (saves money)

Positive impact of the Internet on


organisations
What are the positive impacts of the internet on organisations?
• The positive impacts of the internet on organisations are:
o Improved communication
o Access to global markets
o Access to global workforce
o How information is managed and used

Improved communication
• The internet has made it possible for organisations to communicate with its customers easily and in
real time
• Examples of how organisations can communicate with its customers include:
o Websites
o Email
o Instant messaging
o Social media

Access to global markets


• The internet means organisations can advertise and sell to customers in countries around the world
• Organisations have easier access to manufacturers and can communicate more efficiently with them
• They can sell products online and reduce costs on:
o Overheads (rent, utilities and staff)
o Packaging
o Postal charges

Access to global workforce


• With the internet, organisations can now find and hire the best talent for the job, regardless of
location
• Organisations can be more selective, they are not limited to employees within travelling distance of a
place of work
• They can select employees from different time zones and utilise different skills
• Organisations may be able to reduce costs, for example, wages in some countries may be lower

How information is managed and used


• Organisations use big data collected from smartphones, online applications, social media and
payments systems to find patterns of behaviour
• This allows organisations to improve the customer experience and improve process efficiency
Negative impact of the Internet on
organisations
What are the negative impacts of the internet on organisations?
• The negative impacts of the internet on organisations are:
o Security issues
o Greater competition

Security issues
• Many organisations store private and valuable data that needs to kept secure
• Traditionally, data would be kept in a secure central location using physical safety measures such as:
o Walls
o Locks
o Alarms
o Security guards
• The internet now means employees are able to access secure data working remotely
• Typically this is achieved in three ways:
o VPN (link here) - remotely access organisations data on servers
o Transfer a copy of organisations data to home via external storage or email
o Storing organisations data on someone else's server (cloud)
• Data being accessed remotely means it is more vulnerable to threats such as:

Threat Prevention
Employees revealing login details intentionally/accidentally Policies to ensure employees are
accountable for their actions

Unauthorised users intercepting data being transferred on the Encryption


internet

Unauthorised users hack in to the organisations systems Firewalls/authentication

Greater competition
• The internet means organisations have greater competition for products and services
• Traditionally, organisations were only in competition with other organisations in their local area or
country
• The internet means consumers can buy from organisations globally, this extra competition can drive
down prices
• Some organisations and entire industries have been put at risk because of this, some examples
include:

Industry/service Risk

Music/film rental Online downloads & streaming

Record labels Independent artists can release their own music online

Estate agents Online advertising/virtual viewings

Newspaper publishers Online news and information services

Postal services Send messages and digital media instantly

Less-restricted networks
What is the impact of less-restricted networks?
• The impact of less-restricted networks is evident in mass communication (media) such as:
o Broadcastings
o Publishing
o The internet

Impact Impacts
Broadcasting a • Before the internet, an individual would need to persuade a media outlet
message to broadcast their message
• It was difficult to get a message to the masses
• Social media and video streaming have given society a platform to share
their own messages to a global audience

Online content • Controlled by moderators


• Service owners control content can be published
• Algorithms determine what content watchers see based upon browsing
history & online activity
• Paid promotion will be seen by more users than individuals that don't pay

User generated • Sites such as Wikipedia have removed the element of fact checking by
reference sites experts or editors
• Users can contribute content that may or may not be true

Law enforcement Negative

• Use of social media and video messaging services to organise illegal


activities whilst avoiding police

Positive

• Use of a network of CCTV cameras to record illegal actions


• Footage captured on social media to help identify suspects
• Social media used to organise events to support victims

Information rich & information poor


What is the information gap?
• The information gap refers to the divide created between people who have access to online
information, and those that do not

Information rich Information poor

Good access to information, this improves Reduced access to information, this decreases
education and helps enable them to make education and reduces their ability to make decisions
decisions

Unequal access & socialising


What is the digital divide?
• The digital divide is the gap between people who have access to digital devices and the internet and
people who do not
• Factors that affect people's access include:
Factor Description

Economy & • Countries with a strong economy can invest in infrastructure that provides
infrastructure access to networks and the internet
• Countries with emerging and developing economies may prioritise other
needs (food, healthcare etc.)

Location • People who live in remote locations where wireless signals and/or cabling
is unavailable to reach

Politics • Government control over access to information


• Not allowing access to certain websites or content from other countries
• Blocked access to satellites to stop television/radio broadcasts due to
cultural influences

Religion • Some religions block access to technology

Disability • Some digital devices are not inclusive

Social • Age
• Gender
• Education
• Income

Changes in ways of socialising


• Traditional methods of socialising, meeting in person and talking, have been replaced with an
increased use of digital devices
• The internet allows people to connect with other people around the world
• The use of digital devices can lead to isolation and anxiety around meeting people in real life

Functions & Features of Online Communities


What is an online community?
• An online community is a group of people with a shared common interest who communicate online
• Every online community has:
o a function - what it does for people who use it
o features - what enables it to function

Social networking
What is social networking?
• Social networking is the practice of forming groups in society
• The internet has made it possible it possible to do this online

What is the function of social networking communities?


• The function of social networking communities is to allow users to connect through shared interests
or relationships
• Traditionally, they were separated in to personal and professional communities
• Personal communities included examples such as:
o Facebook
o Twitter (X)
• Professional communities included examples such as:
o LinkedIn
Features of social networking communities
Feature Description

Profiles • A collection of information about a person

Friends, follow and connect • Ability to add friends to your network


• Can be followed to keep up to date with events
• Profiles can be limited for certain friends/groups

Stream, wall and timeline • Messages from friends and groups appear here
• Usually the first thing a user sees when logged in
• Chronologically ordered

Status updates and posts • Users can write messages to friends, groups or to everyone
• Messages appear on their stream
• Messages can be directed at groups of users
• Content of status updates is stored by social network providers
and can be used for targeted advertising

Groups, lists and circles • Users can belong to specific groups created for common interests
or likes
• Members can be added/removed

Tags • Allows content to be categorised


• Users can search for tags to find content

User suggestions • Users with similar interests or shared personal/professional


experiences can be suggested for users to connect with

Reactions, ratings, likes, • Users can rate content


upvotes and downvotes • Letting other users know what they like or find funny
• Users can also downvote content
• Feedback can feed in to targeted advertising

Share • Users can share other peoples posts/comment


• Opening users comments/posts to a wider audience can lead to
them going viral

Comments and quotes • Allows users to mention specific posts/comments in their


messages
• Can start a dialogue between users

Third-party integration • Allows users to easily share content across other platforms
(Facebook & Instagram for example)
Notifications • Tells users about new activities
• Keeps users up to date

Private or direct messages • Allows users to be able to send private messages directly to other
users without posting publicly

Online gaming
What is online gaming?
• Online gaming is when video games are played over the internet or computer network
• Examples include:
o Xbox Live
o PlayStation Network
o Steam

What is the function of online gaming?


• The function of online gaming is to allow users to play multiplayer games together

Features of online gaming


Feature Description

Links to social media • Share gaming experience and connect with friends

Users profiles • Personalise online identity and showcase achievements

How-to's • In-game tutorials and guides to completing games

Experience • Rewards for in-game achievements to motivate users to continue to


points/trophies play

Discussion boards/forums • Somewhere for users to share tips, tricks and general game talk

Notifications • Keep you informed about updates, friend activity and events

Online work spaces


What is an online work space?
• Online work spaces are virtual platforms that bring remote teams and projects together
• Examples of online work spaces include:
o Slack
o SharePoint
o Adobe Connect

What is the function of online work spaces?


• The function of online work spaces is to give users a platform to be able to collaborate together for
the purposes of work

Features of online work spaces


Feature Description

Cloud storage • Provides access to data to all users

Commenting • Users can provide feedback directly in documents and tasks

Messaging system • Quick and easy communication between users

Shared calendars • Allows users to see availability of other users and for scheduling

Contacts list • Central location to find and connect with users

Chat rooms • Real-time discussion spaces for specific topics or projects

Virtual meeting spaces • Conduct video conferences and presentations online

Virtual learning environments (VLE)


What is a VLE?
• A VLE is an online platform for education and training
• Examples of online work spaces include:
o Google Classroom
o Microsoft Teams
o Moodle

What is the function of a VLE?


• The function of a VLE is give teachers and students a shared platform to use learning and assessment
features

Features of a VLE
Feature Description

Wall or timeline • Allows teachers/students to keep up to date with latest posts/events

Notice boards • Allows teachers to give announcements to students or classes

Multimedia sharing • Allows users to share audio, video, web links or files

Quizzes or multiple choice • Self marking tests that are graded automatically
tests

Communication tools • Moderated by a teacher


Log-in system • Linked to a school or colleges management system to auto enrol
students/teachers

Gradebooks • Allow teachers and students to monitor progress through a course

Functions & Features of User-generated Content


User-generated reference sites
What is a user-generated reference site?
• A user-generated reference site is an information websites created & maintained by communities of
users
• Examples of user-generated reference sites include:
o Wikis
o Forums

What is the function of a wiki?


• The function of a wiki is to allow users to contribute to a community website or database
• Wiki users collaborate in order to build and edit web pages

Features of a wiki
Feature Description

User accounts • Allow users to track edits


• Track who has made edits

Editor • Gives users an editor to make changes to add new content

Search tools • Allows users to quickly and easily search for content

What is the function of a forum?


• The function of a forum is to provide its users with online space for structured discussions

Features of a forum
Feature Description

Moderators • Manage discussions and enforce rules to keep order

Administrators • In control of the entire forum


• Manage users
• Introduce new features

Posts • Users messages that contribute to a thread

Threads • A collection of posts about a specific topic


Ratings • Users can express opinions on the value or helpfulness of a post

Censoring • Automatically removes content that violates the forum's rules or is inappropriate

Reports & flags • Allows users to notify moderators about problematic content

User-generated content
What is user-generated content?
• User-generated content is made by users of sites and services and available online
• Examples of user-generated content include:
o Video & photo sharing sites
o Blogs & vlogs

What is the function of video & photo sharing sites?


• The function of video & photo sharing sites is to allow users to access and share content created by
each other
• Creating a sense of community

Features of video & photo sharing sites


Feature Description

User accounts • Allows users to register, upload and manage content

Content management • Provides tools for uploading, organising, editing and sharing
system content

Tags • Allows users to add keywords to help categorise and discover


content

Ratings • Allows users to express opinions on content

Comments • Allows users to leave messages directly on content

Third party integration • Connects with other social media platforms for wider sharing

Social bookmarking
What is social bookmarking?
• Social booking sites give users a platform to categorise and share web documents and URLs
• Examples of social bookmarking sites include:
o Pinterest
o Reddit

What is the function of social bookmarking sites?


• The function of social bookmarking is to share web documents and URLs

Features of social bookmarking sites


Feature Description

User accounts • Allows users to register, upload and manage documents and URLs

Third party integration • Connects with other social media platforms for wider sharing

Tags •
Allows users to categorise content

Social network features •


Allows users to connect with each other

Laws Impacts Digital Technology


Data protection
What is the Data Protection Act?
• The Data Protection Act (DPA) is a law that protects personal data from being misused
• Examples of personal data would include
o Name
o Address
o Date of Birth
o Race
o Religion
• Most people that store personal data has to follow the Data Protection Principles although there are a
few exemptions:
o Domestic purposes – if you only use personal data for such things as writing to friends and
family or taking pictures for your own enjoyment, you are not subject to the DPA
o Law enforcement – the Police investigating a crime is not subject to the DPA. E.g. if
someone has been suspected of a crime they can't request to see the evidence about them
o Intelligence services processing – personal data processed by the intelligence services (e.g.
MI5) is not covered by the DPA

The data protection principles


Principle How does it affect a company? Example

1. Personal data must A company has to be clear about what A school can request personal
be fairly and lawfully personal data they wish to collect and what data to be able to call guardians
processed they want to use it for in an emergency
2. Personal data must A company cannot use personal data for any A company asks for a phone
be collected for purpose other than what they stated number to call regarding delivery
specified and lawful originally. They also cannot pass this data but then uses it to market new
purposes on without permission products

3. Personal data must A company cannot request personal data A bank cannot ask for their
be adequate, relevant that they do not need right away customer's previous trips when
and not excessive opening an account

4. Personal data must If a company holds personal data that is If a bank has a customer's old
be kept accurate and up wrong or out of date then you have a right address then they will not be able
to date to have it corrected or deleted to send up to date statements

5. Personal data will not A company must delete personal data once If a customer closes their account
be kept for longer than they no longer have a need for it the company must delete their
is necessary data

6. Personal data must If requested a company must provide a A hospital has to give a patient’s
be processed in line customer with all the personal data they full records if requested by the
with people's rights hold on them patient

Copyright
What is copyright?
• Copyright is covered under a law called the Copyright Designs & Patents Act
• This protects the intellectual property of an individual or a company
• It makes it illegal to copy, modify or distribute software or other intellectual property without the
relevant permission
• If original work is original, copyright will be automatically applied and will not expire until 25 - 70
years from the death of the creator depending on the type of work
• If an individual believes that their work has been copied it is their responsibility to take action under
the Copyright Designs and Patents Act
• Many sites online offer free downloads of copyrighted software/videos which prevents the
intellectual copyright holder from earning their income on the work they have created
o E.g. If someone downloaded videos from Netflix and shared them with others, they would be
breaching the act
• The act covers videos and audio where peer-to-peer streaming prevents a copyright owner from
receiving an income

What is prohibited under the Copyright, Designs & Patents Act?


Primary breaches:
• Copying an original work
• Issuing a copy of the original work to the public
• Renting/lending a copy of the original work to the public
• Performing, showing or playing the original work in public
• Making an adaptation of the original work

Secondary breaches:
• Importing a copy of the original work
• Possessing or dealing with a copy of the original work
• Providing means to make copies of the original work
• Permitting the use of premises for making copies of the original work
• Provision of props/equipment for a performance of a copy of the original work

Software piracy
• Software piracy is the illegal copying and distribution of software
• Companies often take a lot of steps to prevent software piracy, some of these methods include:
o Product key / license: Often a unique string or letters and numbers supplied with the software
to activate it
o Agreement of terms and conditions: Users will be asked to click to agree to the license
agreement before being able to install the software
o Holograms: Holograms are often used on the packaging of software and they indicate that the
copy is genuine as they are too difficult and costly for pirates to implement
o Some older software would only run if the CD ROM or memory stick was physically in the
device using it

Are there any copyright exemptions?


• Some countries have exemptions to the copyright law
• In the UK for example, they have fair use
• Examples of fair use include:
o Uses for the benefit of people with a disability
o Non-commercial research or private study
o Recordings of broadcasts for archiving
o Copies of books/documents made by a library, educational establishment, museums or
archives
o When used in a parody

Monitoring individuals
How can individuals be monitored?
• Digital technology can be used to monitor individuals but it is a controversial subject
• Examples of how individuals can be monitored include:
o Closed circuit television (CCTV)
o Automatic number plate recognition (ANPR)
o Physical forms of identification (passports, bank cards, drivers licence etc.)
o Network activity (IP/MAC addresses)
o GPS data shared by apps
o GPS trackers
• Individuals communication can also be monitored
o Parental control software to monitor children's online activity
o Social media
o Web histories
• In the UK, the Investigatory Powers Act (2016) allows the police to access these kinds of digital
communications

Benefits & drawbacks


Benefits Drawbacks

Finding people who are lost Compromising peoples privacy

Identify people on a network Expense of setting up, monitoring and


maintaining

Locate friends for social activities Energy consumption

Identify & locate potential criminals at events Making the public not feel trusted

Keeping travellers safe by monitoring events at


airports/train stations

Verifying individuals for financial transactions to reduce


financial crime

Health & Safety


What are health issues?
• Health issues are a common side affect of the prolonged use of IT at home or in the workplace
• There are strategies that should be in place to help prevent health issues such as:
o Repetitive strain injury (RSI)
o Back/neck problems
o Eye strain
o Headaches

Risk Cause Prevention


Repetitive • •
strain injury Damage to the fingers, wrists and joints, Have the correct posture
(RSI) traditionally cause d by prolonged use of a (angle of arms to the
keyboard and mouse keyboard and mouse)
• Use a wrist support if
necessary
• Take regular breaks
• Make use of ergonomic
keyboards

Back/neck • •
problems Sitting in front of a computer screen for Use adjustable chairs
prolonged periods of time • Take regular breaks
• Use a foot rest

Eye strain • •
Staring at a computer screen for prolonged Take regular breaks
periods of time or incorrect lighting • Use anti-glare screen filter
causing reflections • Change from CRT to LCD
monitor

Headaches • •
A combination of factors, including: Take regular breaks
o Poor lighting • Have regular eye tests
o Flickering screens • Use an anti-glare screen
o Reflections filter
o Fatigue

What is physical safety?


• Physical safety is creating a safe environment when using technology
• It includes considering dangers that could lead to serious injury or loss of life
• Identifying strategies to mitigate dangers
• Safety risks include:
o Electrocution from spilling drinks near electrical equipment
o Fire hazard from overloading plug sockets
o Equipment overheating
o Trailing cables (trip hazard)
o Heavy equipment falling and causing injury

Risk Cause Prevention

Electrocution • •
Spilling drinks near Keep liquids away from electrical equipment
electrical equipment
• •
Touching live cables Ensure that cables are properly insulated and
protected
• Use non-conductive materials where possible
• Ensure that electrical equipment is turned off
and unplugged before cleaning or maintenance
• Use circuit breakers or fuses to prevent
electrical overload

Fire hazards • •
Sockets being Use surge protectors to prevent electrical
overloaded overload
• Ensure enough plug sockets in the room
• Don’t plug too many devices into the same plug
socket
• Don’t leave devices plugged in and unattended

• •
Equipment overheating Ensure that equipment is properly ventilated
and not obstructed
• Keep flammable materials away from heat
sources
• Regularly check equipment for signs of wear or
damage
• Use fire extinguishers in case of emergencies
• Turn off or unplug devices when away from the
location
• Do not cover any air vents on devices

Trip hazards • •
Cables not properly Use cable ties or clips to secure cables
secured or organised • Keep cables away from areas where people are
walking
• Secure cables where you can, like under desks
to stop protruding into open areas
• Use cable covers to protect cables and prevent
tripping hazards
• Regularly inspect cables for signs of wear or
damage
• Where possible use wireless devices to reduce
cables

Personal Improperly secured equipment •


safety Ensure that equipment is properly secured and
stable
• Regularly check the stability of locations
containing devices
Equipment not placed on stable •
surfaces Keep equipment away from edges and other
potential hazards
• Regularly inspect equipment and locations
containing devices for signs of wear or damage

Online Safety
Online safety
What is the need for online safety?
• Online safety is about knowing about and using the internet safely and responsibly
• It refers to when an individual is using the internet, email, social media, online gaming
• Online safety refers to the individual knowing how to protect themselves from potential dangers and
threats

Need Description

Protects personal Awareness that personal information should not be shared freely
information

Prevents cyberbullying Awareness of how to act online and how to avoid falling victim, creating a
safe and respectful online environment

Guards against online Identify and avoid online scams, phishing attempts, and fraudulent websites
scams that may try to trick them into sharing personal or financial information

Ensures digital reputation Mindful of online behaviour and interactions, protecting your digital
reputation, which can have long-term consequences in personal and
professional lives

Promotes privacy and Have control over privacy settings on social media platforms, allowing a limit
control to who can access/view personal information and posts

Prevents exposure to Avoid encountering explicit or harmful content online, reducing the risk of
inappropriate content exposure to inappropriate material or online predators
Secures online gaming Engage in online gaming responsibly, avoiding sharing personal details and
experiences maintaining respectful behaviour towards other players

Guards against malware Protecting devices from malware, viruses, and other online threats, preventing
and viruses data loss, privacy breaches, or device damage

Promotes responsible Develop responsible online behaviours, promoting respectful conduct while
digital citizenship interacting with others on the internet

Supports overall well- Maintain a healthy balance between online and offline lives, reducing the risk
being of addiction, mental health issues, or negative impacts on relationships and
self-esteem

How can you be safe using IT?


• There are many ways to remain safe when using technology, by following the advice and guidance
users can stay safe whilst:
o Using the internet
o Sending/receiving email
o Using social media
o Playing games online

Task Advice & guidance

Using the internet •


Use trusted websites recommended by teachers or reputable sources
• Utilise search engines that only allow access to age-appropriate websites
and use filters to ensure inappropriate content is not seen
• Never reveal personal information

Sending/receiving •
email Be aware of the potential dangers of opening or replying to emails from
unknown people, including attachments, potential dangers include phishing,
spam
• Ensure you know who the email is for when considering sending personal
data or images via email, only with people you know and not with
identifiable content like school photos
Using social media •
Know how to block and report people who send content or messages that
are unwanted
• Know where the privacy settings are to reduce the number of people who
can see your posts or images
• Be aware of the potential dangers associated with meeting online contacts
face to face, do not meet anyone you do not know, if you do, take an adult
and meet publicly
• Do not distribute of inappropriate images and inappropriate language
• Respect the confidentiality of personal data belonging to other people
• Only accept friend requests from people you know
• Parents should be aware of what you are doing online, discuss what you are
doing online
• Do not post images or details that can be used to locate you

Playing games •
online Do not use real names as usernames
• Never share personal or financial details with other players
• Know how to block and report players for inappropriate messages or
comments

Acceptable behaviour policies


What is an acceptable behaviour policy?
• An acceptable behaviour policy (ABP) is a set of rules that outlines how people are expected to
conduct themselves online
• ABPs are used in all forms of online community and typically covers:
o Desired behaviours
o Unacceptable behaviours
o Reporting procedures
o Consequences

Environmental Impact of Digital Technology


Environmental impact of digital technology
What are the environmental impacts of digital technology?
• The environmental impacts of digital technology can be categorised in to four key areas:
o Carbon footprint
o E-waste
o Resource consumption
o Energy use

Category Description

Carbon footprint •
The production of, using of and disposing of digital technology adds to
greenhouse gas emissions
E-waste •
A throw-away society generates a growing amount of e-waste
• It often ends up in landfills in less developed countries, leading to health and
pollution hazards

Resource •
consumption Rare materials and resources being consumed during the manufacturing of
digital devices

Energy use •
Increased use of data centres and the number of digital devices in the home
adding extra strain to power grids

Sustainability
• Energy use is a big factor in the sustainability issues caused by the use of digital devices

Cause Issue Mitigation

Digital devices at home Power is produced using non-renewable •


and in the office energies Using renewable energies
• Using more energy efficient
devices

Data centres Requires extensive cooling which is •


generated by non-renewable energies Geolocation of data centres in
colder climates
• Near rivers to to use of natural
hydro-electric power

Natural resources Poisonous substances used in digital •


devices Recycling
• Education
• Laws
• Harmless alternatives

Sources of Information
Sources of information
What is a primary & secondary source?
• A primary source is is a source that you have created yourself
• A secondary source is a source that has been created by someone else
• Examples of primary and secondary sources include:
Primary sources (your own) Secondary sources

Sound recordings Newspapers

Photographs Books

Interviews/questionnaires Television & radio broadcasts

Social media posts Websites

Emails CDs, DVDs or Blu-rays


To select the most appropriate source of information, you must consider:
o It's fitness for purpose
o It's fitness for the intended audience

Using Information
Evaluating information
How can you evaluate information?
• To evaluate information you check it is fit for purpose
• To be fit for purpose you check a sources:
o Accuracy
o Age
o Relevance
o Reliability
o Bias

What to How? Why?


check

Accuracy • •
Check that information is from a Information could be:
reputable source o Incomplete
• Does the information match other o False
reputable sources
• Does the source provide any evidence
Age • •
Check publication date Old or now false
• Too recent

Relevance • •
Check information's topic matches Ensure information matches topic
exactly what you were searching for you wanted

Reliability • •
Compare information against other If it does not match it could be
sources of the same information false or inaccurate

Bias • •
Does the source consider different Information could be prejudiced
viewpoints • Only looking at one side of an
• Is the source just facts or does it give argument/viewpoint
extra context
• If source contains data/statistics, where
did they come from?

Understanding copyright & plagiarism


What is copyright?
• Copyright is covered under a law called the Copyright Designs & Patents Act
• This protects the intellectual property of an individual or a company
• It makes it illegal to copy, modify or distribute software or other intellectual property without the
relevant permission
• If original work is original, copyright will be automatically applied and will not expire until 25 - 70
years from the death of the creator depending on the type of work
• If an individual believes that their work has been copied it is their responsibility to take action under
the Copyright Designs and Patents Act
• Many sites online offer free downloads of copyrighted software/videos which prevents the
intellectual copyright holder from earning their income on the work they have created
o E.g. If someone downloaded videos from Netflix and shared them with others, they would be
breaching the act
• The act covers videos and audio where peer-to-peer streaming prevents a copyright owner from
receiving an income

What is plagiarism?
• Plagiarism is when someone presents information or ideas from another source as their own, without
giving credit to the original author
• This can be done intestinally and unintentionally
• They may also try to claim it as their own
• A common example of digital plagiarism is copying and pasting from the internet
• If someone uses another persons information and fails to state who it belongs to they are breaking
their rights and committing plagiarism
• To avoid plagiarism a user should rewrite or rephrases information
• This shows you have read and understood information but can put it in your own words
• To avoid plagiarism always state where the information came from, this can include the authors
name or URL it was found on

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy