chapter6 Note
chapter6 Note
Virus •
A program which can replicate itself on a user's computer. It contains code that
will cause unwanted and unexpected events to occur
• Examples of issues a user may experience are
o Corrupt files
o Delete data
o Prevent applications from running correctly
Worms •
Worms are very similar to viruses, with the main difference being that they will
spread to other drives and computers on the network
• Worms can infect other computers from
o Infected websites
o Instant message services
o Email
o Network connection
Trojan •
Sometimes also called a Trojan Horse
• Trojans disguisethemselves as legitimate software but contain malicious code in
the background
Spyware •
Software which will allow a person to spy on the users' activitieson their devices
• This form of software will be embedded into other software such as games or
programs that have been downloaded from illegitimate sources
• Spyware can record your screen, log your keystrokes to gain access to passwords
and more
Ransomware •
A form of malware that locks your computer or device and encrypts your
documents and other important files
• Often a demand is made for money to receive the password that will allow the
user to decrypt the files
• There is no guarantee paying the ransom will result in the user getting their data
back
Phishing & pharming
What is a phishing?
• Phishing is a form of social engineering
• It involves sending fraudulent, legitimate-looking emails to a large number of email addresses,
claiming to be from a reputable company or trusted source to try and gain access to your details
• Phishing often tries to coax the user to click on a login button to enter their details
What are the effects of phishing?
• The creator of the email can gain unauthorised access to personal data such as login information,
bank accounts and more
• Phishing can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can phishing be prevented?
• Phishing can be prevented by:
o Anti-spam filters to avoid fraudulent emails arriving in a user's inbox
o Training staff to recognise fraudulent emails and to avoid opening attachments from
unrecognised senders
o User access levels to prevent staff from being able to open files-types such as executable
(.exe) files and batch (.bat) files
What is a pharming?
• Pharming is typing a website address into a browser and it is redirected to a 'fake' website to
trick a user into typing in sensitive information such as passwords
• An attacker attempts to alter DNSsettings or change a users browser settings to redirect users to the
fraudulent website
What are the effects of pharming?
• The creator of the malicious content can gain unauthorised access to personal data such as login
information, bank accounts and more
• Pharming can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can pharming be prevented?
• Pharming can be prevented by:
o Keeping anti-malware software up to date
o Checking URLs regularly
o Make sure the padlock icon is visible
• •
Unique to the person and can not be can be intrusive, for example, scanning eyes
copied, meaning that the data is always • Scans be not be recognised, an example of
with the person could be fingerprint scans with dirty hands
• Passwords can be easily copied, forgotten, • Very expensive to install
guessed or cracked • Low light can provide an issue for facial
• It is difficult to copy or forge biometric recognition as well as hats and glasses
data • People may be uncomfortable having their
• Eliminates the possibility of attacks such as most unique characteristics being stored in a
shoulder surfing and key-logging software database
• A high degree of accuracy as there is no
known way to copy a person's retina
pattern for example
What is a CAPCHA?
• A CAPCHA is a method of testing if a website request originates from a human or a machine
(bot)
• Completely Automated Public Turing test to tell Computers & Humans Apart (CAPTCHA)
examples include:
o Text - Asking users to enter characters from a distorted text box, users would need to
decipher the characters and enter them in a designated box
o Image - A grid of images, a user would be asked to select all those that contain a specific
object
o Checkbox - A simple checkbox appears asking the user to confirm they are not a robot
• A CAPTCHA can be used to prevent spam and protect logins
Anti-malware
What is anti-malware software?
• Anti-malware software is a term used to describe a combination of different software to prevent
computers from being susceptible to viruses and other malicious software
• The different software anti-malware includes are
o Anti-virus
o Anti-spam
o Anti-spyware
How does anti-malware work?
• Anti-malware scans through emailattachments, websites and downloaded files to search for issues
• Anti-malware software has a list of known malware signatures to blockimmediately if they try to
access your device in any way
• Anti-malware will also perform checks for updates to ensure the database of known issues is up to
date
Access rights
What are access rights?
• Access rights ensure users of a network can access what they need to access and do not have access
to information/resources they shouldn't
• Users can have designated roles on a network
• Access rights can be set based on a user's role, responsibility, or clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without editing or deleting
o No access - this hides the file from the user
• Some examples of different rights of access to a school network could include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but cannot access other staff
members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions
Secure websites
What is HTTP & HTTPS?
• Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website
viewing
• HTTP allows clients to receive datafrom the sever (fetching a webpage) and send data to the server
(submitting a form, uploading a file)
• HTTPS works in the same way as HTTP but with an added layer of security
• All data sent and received using HTTPS is encrypted
• HTTPS is used to protect sensitive information such as passwords, financial information and
personal data
Email safety
What is email safety?
• Users should be aware of the dangers when using email, especially email attachments and web
links
• To ensure users use email safely they should take extra cautionwhen:
o Email is from an unknown sender
o Text is general or impersonal
o Contains spelling, punctuation or grammar mistakes
o Attached files are executable files (.exe)
o Urgency is the tone of the message
o Don't recognise the URL
Backup procedures
What is a backup software?
• Backup software is used to create copies of personal data in order to keep it safe in the event of:
o Accidental loss
o Data theft
• Backups can be automated and scheduled to happen at less busy periods of the day, to not take up
valuable system resources (e.g. overnight etc.)
• Backups can be made in two ways:
o Full - all files are backed up (saftest, slow)
o Incremental - only files that have been added/modified since the last backup are backed up
(faster, less secure)
• Backups can be stored locally (secondary storage) or remotely(cloud)
• Backup software can be purchased or come as a standalone application bundled with an operating
system
Cyber security •
Skilled works to look after and protect systems
from attack
• Trained to work with computer systems and
networks
Data science •
Experts to analyse data and extract insights
• Programming knowledge
Digital marketing •
Content creation
• Search engine optimisation (SEO)
• Social media marketing
Cloud computing •
Cloud architects
• Security specialists
Job losses
• Employees who choose to not improve their skills using the internet may unfortunately not have
the skills required to carry out new work
• If they are unwilling to retrain this may lead to job losses
Impact of the internet on working practices
What are working practices?
• Working practices are the ways in which a person goes about completing a task as part of their job
• Examples of working practices include:
o Collaborative working
o Flexible working
Collaborative working
Access to Information
Access to Information
Does the internet give access to more information?
• Yes, the internet gives access to a wealth of information
• Individuals can keep up to date with news, sport and weather information 24 hours a day
• Traditional media such as television and radio have some disadvantages that the internet has solved
Television and radio Internet
Only available within range of transmitter Access from anywhere with a connection
Limited access to news from other countries More open access, some content is geo-restricted
Can employee from a wider location More difficult to manage and support employees
(internationally)
No commuting for employees (no lateness) Complications with payroll for workers in different
coutries
No travel to work (less stress, saves money etc.) Distractions at home (family, leisure activities)
Less distractions
Comfortable environment
Improved communication
• The internet has made it possible for organisations to communicate with its customers easily and in
real time
• Examples of how organisations can communicate with its customers include:
o Websites
o Email
o Instant messaging
o Social media
Security issues
• Many organisations store private and valuable data that needs to kept secure
• Traditionally, data would be kept in a secure central location using physical safety measures such as:
o Walls
o Locks
o Alarms
o Security guards
• The internet now means employees are able to access secure data working remotely
• Typically this is achieved in three ways:
o VPN (link here) - remotely access organisations data on servers
o Transfer a copy of organisations data to home via external storage or email
o Storing organisations data on someone else's server (cloud)
• Data being accessed remotely means it is more vulnerable to threats such as:
Threat Prevention
Employees revealing login details intentionally/accidentally Policies to ensure employees are
accountable for their actions
Greater competition
• The internet means organisations have greater competition for products and services
• Traditionally, organisations were only in competition with other organisations in their local area or
country
• The internet means consumers can buy from organisations globally, this extra competition can drive
down prices
• Some organisations and entire industries have been put at risk because of this, some examples
include:
Industry/service Risk
Record labels Independent artists can release their own music online
Less-restricted networks
What is the impact of less-restricted networks?
• The impact of less-restricted networks is evident in mass communication (media) such as:
o Broadcastings
o Publishing
o The internet
Impact Impacts
Broadcasting a • Before the internet, an individual would need to persuade a media outlet
message to broadcast their message
• It was difficult to get a message to the masses
• Social media and video streaming have given society a platform to share
their own messages to a global audience
User generated • Sites such as Wikipedia have removed the element of fact checking by
reference sites experts or editors
• Users can contribute content that may or may not be true
Positive
Good access to information, this improves Reduced access to information, this decreases
education and helps enable them to make education and reduces their ability to make decisions
decisions
Economy & • Countries with a strong economy can invest in infrastructure that provides
infrastructure access to networks and the internet
• Countries with emerging and developing economies may prioritise other
needs (food, healthcare etc.)
Location • People who live in remote locations where wireless signals and/or cabling
is unavailable to reach
Social • Age
• Gender
• Education
• Income
Social networking
What is social networking?
• Social networking is the practice of forming groups in society
• The internet has made it possible it possible to do this online
Stream, wall and timeline • Messages from friends and groups appear here
• Usually the first thing a user sees when logged in
• Chronologically ordered
Status updates and posts • Users can write messages to friends, groups or to everyone
• Messages appear on their stream
• Messages can be directed at groups of users
• Content of status updates is stored by social network providers
and can be used for targeted advertising
Groups, lists and circles • Users can belong to specific groups created for common interests
or likes
• Members can be added/removed
Third-party integration • Allows users to easily share content across other platforms
(Facebook & Instagram for example)
Notifications • Tells users about new activities
• Keeps users up to date
Private or direct messages • Allows users to be able to send private messages directly to other
users without posting publicly
Online gaming
What is online gaming?
• Online gaming is when video games are played over the internet or computer network
• Examples include:
o Xbox Live
o PlayStation Network
o Steam
Links to social media • Share gaming experience and connect with friends
Discussion boards/forums • Somewhere for users to share tips, tricks and general game talk
Notifications • Keep you informed about updates, friend activity and events
Shared calendars • Allows users to see availability of other users and for scheduling
Features of a VLE
Feature Description
Multimedia sharing • Allows users to share audio, video, web links or files
Quizzes or multiple choice • Self marking tests that are graded automatically
tests
Features of a wiki
Feature Description
Search tools • Allows users to quickly and easily search for content
Features of a forum
Feature Description
Censoring • Automatically removes content that violates the forum's rules or is inappropriate
Reports & flags • Allows users to notify moderators about problematic content
User-generated content
What is user-generated content?
• User-generated content is made by users of sites and services and available online
• Examples of user-generated content include:
o Video & photo sharing sites
o Blogs & vlogs
Content management • Provides tools for uploading, organising, editing and sharing
system content
Third party integration • Connects with other social media platforms for wider sharing
Social bookmarking
What is social bookmarking?
• Social booking sites give users a platform to categorise and share web documents and URLs
• Examples of social bookmarking sites include:
o Pinterest
o Reddit
User accounts • Allows users to register, upload and manage documents and URLs
Third party integration • Connects with other social media platforms for wider sharing
Tags •
Allows users to categorise content
1. Personal data must A company has to be clear about what A school can request personal
be fairly and lawfully personal data they wish to collect and what data to be able to call guardians
processed they want to use it for in an emergency
2. Personal data must A company cannot use personal data for any A company asks for a phone
be collected for purpose other than what they stated number to call regarding delivery
specified and lawful originally. They also cannot pass this data but then uses it to market new
purposes on without permission products
3. Personal data must A company cannot request personal data A bank cannot ask for their
be adequate, relevant that they do not need right away customer's previous trips when
and not excessive opening an account
4. Personal data must If a company holds personal data that is If a bank has a customer's old
be kept accurate and up wrong or out of date then you have a right address then they will not be able
to date to have it corrected or deleted to send up to date statements
5. Personal data will not A company must delete personal data once If a customer closes their account
be kept for longer than they no longer have a need for it the company must delete their
is necessary data
6. Personal data must If requested a company must provide a A hospital has to give a patient’s
be processed in line customer with all the personal data they full records if requested by the
with people's rights hold on them patient
Copyright
What is copyright?
• Copyright is covered under a law called the Copyright Designs & Patents Act
• This protects the intellectual property of an individual or a company
• It makes it illegal to copy, modify or distribute software or other intellectual property without the
relevant permission
• If original work is original, copyright will be automatically applied and will not expire until 25 - 70
years from the death of the creator depending on the type of work
• If an individual believes that their work has been copied it is their responsibility to take action under
the Copyright Designs and Patents Act
• Many sites online offer free downloads of copyrighted software/videos which prevents the
intellectual copyright holder from earning their income on the work they have created
o E.g. If someone downloaded videos from Netflix and shared them with others, they would be
breaching the act
• The act covers videos and audio where peer-to-peer streaming prevents a copyright owner from
receiving an income
Secondary breaches:
• Importing a copy of the original work
• Possessing or dealing with a copy of the original work
• Providing means to make copies of the original work
• Permitting the use of premises for making copies of the original work
• Provision of props/equipment for a performance of a copy of the original work
Software piracy
• Software piracy is the illegal copying and distribution of software
• Companies often take a lot of steps to prevent software piracy, some of these methods include:
o Product key / license: Often a unique string or letters and numbers supplied with the software
to activate it
o Agreement of terms and conditions: Users will be asked to click to agree to the license
agreement before being able to install the software
o Holograms: Holograms are often used on the packaging of software and they indicate that the
copy is genuine as they are too difficult and costly for pirates to implement
o Some older software would only run if the CD ROM or memory stick was physically in the
device using it
Monitoring individuals
How can individuals be monitored?
• Digital technology can be used to monitor individuals but it is a controversial subject
• Examples of how individuals can be monitored include:
o Closed circuit television (CCTV)
o Automatic number plate recognition (ANPR)
o Physical forms of identification (passports, bank cards, drivers licence etc.)
o Network activity (IP/MAC addresses)
o GPS data shared by apps
o GPS trackers
• Individuals communication can also be monitored
o Parental control software to monitor children's online activity
o Social media
o Web histories
• In the UK, the Investigatory Powers Act (2016) allows the police to access these kinds of digital
communications
Identify & locate potential criminals at events Making the public not feel trusted
Back/neck • •
problems Sitting in front of a computer screen for Use adjustable chairs
prolonged periods of time • Take regular breaks
• Use a foot rest
Eye strain • •
Staring at a computer screen for prolonged Take regular breaks
periods of time or incorrect lighting • Use anti-glare screen filter
causing reflections • Change from CRT to LCD
monitor
Headaches • •
A combination of factors, including: Take regular breaks
o Poor lighting • Have regular eye tests
o Flickering screens • Use an anti-glare screen
o Reflections filter
o Fatigue
Electrocution • •
Spilling drinks near Keep liquids away from electrical equipment
electrical equipment
• •
Touching live cables Ensure that cables are properly insulated and
protected
• Use non-conductive materials where possible
• Ensure that electrical equipment is turned off
and unplugged before cleaning or maintenance
• Use circuit breakers or fuses to prevent
electrical overload
Fire hazards • •
Sockets being Use surge protectors to prevent electrical
overloaded overload
• Ensure enough plug sockets in the room
• Don’t plug too many devices into the same plug
socket
• Don’t leave devices plugged in and unattended
• •
Equipment overheating Ensure that equipment is properly ventilated
and not obstructed
• Keep flammable materials away from heat
sources
• Regularly check equipment for signs of wear or
damage
• Use fire extinguishers in case of emergencies
• Turn off or unplug devices when away from the
location
• Do not cover any air vents on devices
Trip hazards • •
Cables not properly Use cable ties or clips to secure cables
secured or organised • Keep cables away from areas where people are
walking
• Secure cables where you can, like under desks
to stop protruding into open areas
• Use cable covers to protect cables and prevent
tripping hazards
• Regularly inspect cables for signs of wear or
damage
• Where possible use wireless devices to reduce
cables
Online Safety
Online safety
What is the need for online safety?
• Online safety is about knowing about and using the internet safely and responsibly
• It refers to when an individual is using the internet, email, social media, online gaming
• Online safety refers to the individual knowing how to protect themselves from potential dangers and
threats
Need Description
Protects personal Awareness that personal information should not be shared freely
information
Prevents cyberbullying Awareness of how to act online and how to avoid falling victim, creating a
safe and respectful online environment
Guards against online Identify and avoid online scams, phishing attempts, and fraudulent websites
scams that may try to trick them into sharing personal or financial information
Ensures digital reputation Mindful of online behaviour and interactions, protecting your digital
reputation, which can have long-term consequences in personal and
professional lives
Promotes privacy and Have control over privacy settings on social media platforms, allowing a limit
control to who can access/view personal information and posts
Prevents exposure to Avoid encountering explicit or harmful content online, reducing the risk of
inappropriate content exposure to inappropriate material or online predators
Secures online gaming Engage in online gaming responsibly, avoiding sharing personal details and
experiences maintaining respectful behaviour towards other players
Guards against malware Protecting devices from malware, viruses, and other online threats, preventing
and viruses data loss, privacy breaches, or device damage
Promotes responsible Develop responsible online behaviours, promoting respectful conduct while
digital citizenship interacting with others on the internet
Supports overall well- Maintain a healthy balance between online and offline lives, reducing the risk
being of addiction, mental health issues, or negative impacts on relationships and
self-esteem
Sending/receiving •
email Be aware of the potential dangers of opening or replying to emails from
unknown people, including attachments, potential dangers include phishing,
spam
• Ensure you know who the email is for when considering sending personal
data or images via email, only with people you know and not with
identifiable content like school photos
Using social media •
Know how to block and report people who send content or messages that
are unwanted
• Know where the privacy settings are to reduce the number of people who
can see your posts or images
• Be aware of the potential dangers associated with meeting online contacts
face to face, do not meet anyone you do not know, if you do, take an adult
and meet publicly
• Do not distribute of inappropriate images and inappropriate language
• Respect the confidentiality of personal data belonging to other people
• Only accept friend requests from people you know
• Parents should be aware of what you are doing online, discuss what you are
doing online
• Do not post images or details that can be used to locate you
Playing games •
online Do not use real names as usernames
• Never share personal or financial details with other players
• Know how to block and report players for inappropriate messages or
comments
Category Description
Carbon footprint •
The production of, using of and disposing of digital technology adds to
greenhouse gas emissions
E-waste •
A throw-away society generates a growing amount of e-waste
• It often ends up in landfills in less developed countries, leading to health and
pollution hazards
Resource •
consumption Rare materials and resources being consumed during the manufacturing of
digital devices
Energy use •
Increased use of data centres and the number of digital devices in the home
adding extra strain to power grids
Sustainability
• Energy use is a big factor in the sustainability issues caused by the use of digital devices
Sources of Information
Sources of information
What is a primary & secondary source?
• A primary source is is a source that you have created yourself
• A secondary source is a source that has been created by someone else
• Examples of primary and secondary sources include:
Primary sources (your own) Secondary sources
Photographs Books
•
To select the most appropriate source of information, you must consider:
o It's fitness for purpose
o It's fitness for the intended audience
Using Information
Evaluating information
How can you evaluate information?
• To evaluate information you check it is fit for purpose
• To be fit for purpose you check a sources:
o Accuracy
o Age
o Relevance
o Reliability
o Bias
Accuracy • •
Check that information is from a Information could be:
reputable source o Incomplete
• Does the information match other o False
reputable sources
• Does the source provide any evidence
Age • •
Check publication date Old or now false
• Too recent
Relevance • •
Check information's topic matches Ensure information matches topic
exactly what you were searching for you wanted
Reliability • •
Compare information against other If it does not match it could be
sources of the same information false or inaccurate
Bias • •
Does the source consider different Information could be prejudiced
viewpoints • Only looking at one side of an
• Is the source just facts or does it give argument/viewpoint
extra context
• If source contains data/statistics, where
did they come from?
What is plagiarism?
• Plagiarism is when someone presents information or ideas from another source as their own, without
giving credit to the original author
• This can be done intestinally and unintentionally
• They may also try to claim it as their own
• A common example of digital plagiarism is copying and pasting from the internet
• If someone uses another persons information and fails to state who it belongs to they are breaking
their rights and committing plagiarism
• To avoid plagiarism a user should rewrite or rephrases information
• This shows you have read and understood information but can put it in your own words
• To avoid plagiarism always state where the information came from, this can include the authors
name or URL it was found on