You are on page 1of 6

Chapter 8 Google Docs Alkhattab Alnaqeeb 11SAT

CHAPTER 8 REVISION/CLASS NOTES

USE THIS FOR CHAPTER 8 REVISION


(PAGE LEFT BLANK INTENTIONALLY)

1
Chapter 8 Google Docs Alkhattab Alnaqeeb 11SAT

PHYSICAL SAFETY

Physical safety is about ensuring that you do not come to any


harm while working with computer equipment

Overheating- 🥵
Cause- Computers give out large amounts of heat & rooms containing heat can
cause them to become hot.
Prevention- Install air-conditioning or ensure ventilation around the room.

Fire- 🔥
Cause- ICT equipment uses lots of power sockets and multi sockets. A simple
overload can cause the main socket to burn or cause smoke in the room.
Prevention- Computer rooms should be wired with multiple sockets and a fire
extinguisher should be provided nearby + install smoke detectors and set up
sprinkler systems.

Tripping over cables- 👀


Cause- Cables laid around the room can cause a body hazard meaning you can
physically hurt yourself by tripping etc.
Prevention- Use cable covers or attach the cable to walls or use zip ties to

Electrocution- ⚡
Cause- faulty equipment, spilling drinks on electronics
Prevention- Drinks to be distanced from electronics, any faulty equipments
replaced or notified to technicians

Heavy equipment falling- 🖥


Cause- Equipment not positioned properly
Prevention- ensure there is a large space around the equipment and for it to
be safely positioned.

2
Chapter 8 Google Docs Alkhattab Alnaqeeb 11SAT

PERSONAL DATA

Personal data is data about a living identifiable person such as


their date of birth, the name of the school they attend, banking
details and so on

How to avoid/minimise potential dangers

Emails types of dangers-


opening random documents

Revealing personal details through email
Looking at content sent to you through email
Including details such as a school name or picture of you

Minimise the danger- ✅


Not including personal details in any email
Not opening emails from random users
Not opening any files from random emails

Social media types of dangers- ❌


Following links leading to undesirable content or fake websites made to
steal information/cash
Sharing personal information
Downloading music/films/videos illegally
Not keeping your parents aware what your doing online

Minimise the danger- ✅


Know how to block and report
Never arrange a meeting to meet anyone randomly
Only use appropriate language
Respect confidentiality [if asked to keep information private then keep
it private]
Never mention personal details of your personal life.

Internet types of danger- ❌


Accessing websites with undesirable content
Accessing sites promoting inappropriate behaviours such as drug use
etc
Accessing sites which are known to be a source of viruses

3
Chapter 8 Google Docs Alkhattab Alnaqeeb 11SAT

Minimise the danger- ✅


Never arrange meetings with random users
Never reveal personal details
Use websites recommended by parents/teachers
Parents should supervise internet use
Do not open unknown emails
Do not use your real name playing games
Send emails to people you only know
Use a safe search engine
Do not share pictures of yourself
Do not listen to random users
Ensure parental controls are used to restrict access to certain sites

Playing Games types of danger-


include your name in your user tag

include any personal details in your name
speaking in-game
responding to random users

Minimise the danger-


Do not speak in-game

Do not include personal information in your name
Do not disclose personal information in your game
Do not give personal information to random users
Know how to block someone

4
Chapter 8 Google Docs Alkhattab Alnaqeeb 11SAT

SECURITY OF DATA

Hacking and its effects


Hacking is the process of accessing a computer system without
permission.

Security Measure Description

Firewall Firewalls block other computers from accessing your


computer/network using the internet.

Authentication Techniques The process of identifying a user that requests


secure access to networks

Usernames A username is a series of characters that is used to


identify a user to the network

Passwords A password is a string of characters that the user


selects

Characteristics of strong passwords Include symbols, include a mixture of upper and


lower case letters, do not use your name or a word
that can be found in the dictionary

Digital signatures Signatures can be used to check the authenticity of a


document

Authentication using Biometrics Biometric authentication is a process of identifying a


user through unique biological prints such as eyes
and fingerprints

Secure Socket Layer [SSL]


SSL is a standard used for security for transactions made using the
internet.SSL allows an encrypted link to be set up between two
computers connected using the internet

5
Chapter 8 Google Docs Alkhattab Alnaqeeb 11SAT

You might also like