You are on page 1of 81

Chapter 8

Safety and Security


Safety & Security

Physical Security e-Safety

Security of Data Additional Security


Physical Security

Health Risk

Safety Risk
Health Risk

 Back and Neck Problems/ Strain


 Repetitive Strain Injury (RSI)
 Eyestrain
 Headaches
 Ozone Irritation
Back and Neck Problems/ Strain

Caused
by

Sitting in font of a computer screen


for a long periods in the same
position

Ways of eliminating or minimizing risks


• Use fully adjustable chairs to give the correct
posture
• Use foot rest to reduce posture problem
• Use screen than can be tilted to ensure the neck is at
the correct angle
Repetitive Strain Injury (RSI)

Damage to fingers
and wrists

Caused
by

Continuous use of a keyboard or


repetitive clicking of mouse buttons

Ways of eliminating or minimizing risks


• Ensure correct posture of arms
• Make proper use of wrist rest
• Take regular break
• Make use of ergonomic keyboards
• Use of voice activation software to reduce the use
of finger and wrist
Eyestrain

Caused
by

Staring at a computer screen too


long or having incorrect lighting in
the room

Ways of eliminating or minimizing risks


• Ensure that there is no screen flicker
• Use LCD (less flicker) than CRT
• Take regular breaks (try focusing on point that is some distance away)
• Make use of anti-glare screens
• Use windows blinds to reduce sunlight reflecting from the screen
• Have eyes tested on regular basis
Headaches

Caused
by

incorrect lighting, screen reflection,


flickering screen etc.

Ways of eliminating or minimizing risks


• Make use of anti-glare screens
• Take regular breaks
• Have eyes tested on regular basis and use middle vision glasses if
necessary
Ozone Irritation

Caused
by

Laser printer in an office areas


(dry skins, respiratory problems)

Ways of eliminating or minimizing risks


• Proper ventilation should exist to remove the ozone gas as quickly as
possible
• Laser printer should be housed in a designated printer room
• Change to other types of printer if necessary
Safety Risks

 Electrocution
 Trailing Wire
 Heavy equipment falling and causing injury
 Fire risk
e-Safety

 e-Safety is all about knowing how to use the internet safely and
responsibly.

 includes keeping your personal information private in chat rooms,


social media, emails and when playing online games.
Using the internet to communicate

 The internet provides us with lots of different ways in which we can communicate
with each other. Some of these ways include:
 Instant messaging - (WhatsApp, Viber, Kik etc.)
 Social networking - (Facebook, Twitter, Instagram etc.)
 Bloggs - (Huffington Post, Mashable, Life Hacker etc.)
 Emailing
 VoIP services - (Skype, Viber etc.)
 Chatting in online games.
 When used responsibly, all of these communication tools can make it extremely
easy for us to keep in contact with friends and family
 For example:
 If you have family who live in a different country, you can easily send a message
over WhatsApp and as soon as they are online they will receive it and respond.
 Before the internet, we would have had to use a standard telephone, arrange a
time for the call to be made and incur a large phone bill.
How can you use the internet safely?
 Never reveal personal information - including name, home address, phone number and
photograph
 Only use web sites recommended by teachers or parents
 Use search engines and web sites with filters so that inappropriate content can be filtered
out
 Only open emails from people you know
 Only open email attachments from people you know
 Only accept social media friend requests from people you know
 Use the privacy controls on social media - this will minimize the number of people who can read
your posts
 Never arrange to face-to-face meet people that you have met online - if you do, then take an
adult with you and meet in a public place
 Make sure that your parents know what you are doing online - this includes using social
media and chat rooms
 Know how to block people on social media and in chat rooms - block people who send
unwanted messages/content
 Report unwanted users - contact the owners of a chat room or social media site if you receive
inappropriate attention from other users
 Never post or email pictures of yourself in school uniform
 Never give out the name of your school.
Security of Data

 Hacking
 Phishing
 Pharming
 Spyware & Key-logging
 Viruses
 Spam
 Forum
 Cookies
What is Hacking
 To gain unauthorized access to a computer system without the user knowledge or permission.
 Most of the time, hackers will try to access the computer system using the internet.
 Hackers will usually try to break into the system by simply guessing the password or by using
a key logger.
 Hackers try to break into computers for the following reasons:
 To delete, corrupt, copy and edit files.
 Sensitive data could be sold to competitors.
 Identity theft- to steal user identity
 To expose a company ( for example wiki leaks)
 To cause disruption and stop production
What are the effects of hacking?
Strategies to prevent hacking to Protect Data

 Use of firewalls- sometimes part of the operating system.


 Use of strong passwords which are frequently changed
 Use of protection software to detect and block possible hacking attempts.
 Hire a professional hacker to test the weaknesses of your system.
Phishing
What is Phishing?
 The recipient will receive an email which looks legitimate.
 The email will normally request the user to update their details which could be their
password or payment details.
 To update the users details they will have to click on link which will take them to a face
website
Effect of Phishing

 The user will be tricked into entering their details into a fake website
 The sender of the initial email will have gained personal details from the user.
 These details can be used fraudulently or for identity theft.
Strategies to prevent Phishing

 Use a filter on your email account so that only emails from an allowed users appear in your
inbox.
 Always double check the URL and email address.
What is Pharming
 Internet scamming practice in which malicious code is installed on a personal computer or
server, misdirecting users to fraudulent web sites without their knowledge or consent.
 Pharming has been called “phishing without a lure”.
Effect of Pharming

 The fake website will look like the real website


 Users will be tricked into entering their personal details.
 Like phishing this can lead to fraud or identity theft.
Strategies to prevent Pharming

 Anti spyware software could eliminate pharming code from a computer


 Always double check the URL to see if is the same one you typed in
Spyware and key logging software

 A software which can monitor your use of the computer and monitor and log key pressed.
 Spyware software will send the data back to person who planted the spyware software on
your computer.
 This could include personal details like passwords and banking account information.
 Spyware software could also install additional software to read cookie data and change
web browsing preferences.
Strategies to prevent Spyware

 The use of anti spyware software which is regularly updated.


 The use of a pointing device to select characters when entering sensitive data.
What is Computer Virus?

 A computer virus is a piece of programming code/software which can install and replicate
itself onto a computer system without the user’s permission.
 It’s effect can cause:
 The computer to crash-become slower
 Sometimes files can be deleted – leads to computer malfunction
 Data files can be copied by the hacker or the files could be corrupted
 Could stop production until the virus has been quarantined
Strategies to prevent computer virus

 Install antivirus software and regularly update it.


 Do not use software or USB from unknown sources.
 Be careful about clicking on links from untrusted websites.
 Be careful about downloading attachments from unknown email addresses.
What is Spam Email?

 Spam junk email is sent out to recipients from a mailing list.


 The email could be part of a phishing scam or could be to promote certain products. They
are basically unwanted emails.
 Spam need to be prevented for many reasons:
 Uses up people’s time
 Generally annoys people
 Use up valuable bandwidth on the internet, slowing it down
 Can have viruses attached
 Can be a phishing scam
 Can clog up users’ inboxes
How to prevent Spam?

 Use spam filters


 Never reply to spam email
 Use disposable email
 Be wary about giving out your main email address
 Never reveal your email address on your website
 Try to avoid opening spam emails and clicking on links in spam messages
Moderated

Forum
• Online forums are
interactive websites
where people can take
part in discussion
• Allow users to post their
own comments

unmoderated
Moderated Forum

 All user’s comment will be check by the administrator before they are posted to the forum
 Moderators will not allow any inappropriate comments
 Users who continually to break the rules would likely get banned
 Moderators make sure that rules are followed
Un-moderated Forum

 Do not have moderators or administrators


 Allow people to post what ever they want
 As a result:
 Offensive & inappropriate contents
 Spamming of adverts for rubbish products
 Phishing (tricking people to get their personal data)
Cookies

 Small file or code that are stores on a user’s computer


 Small lookup table containing pair of key and data
 Usually stored user preferences
 Under normal circumstances, cookies cannot transfer viruses of malware to your computer
 However, some viruses and malware may be disguised as cookies
 Form anonymous user profile, doesn’t contain personal data such as password but still
carry data within websites
Passwords

 Passwords are used to restrict access to data or systems.


 They should be hard to break and changed frequently to retain any real level of security.
 passwords are frequently used when
 accessing email accounts
 carrying out online banking or shopping
 accessing social networking sites.
Ways of doing passwords are protected

 Run anti-spyware software to make sure that your passwords are not being relayed back to anyone
 Change passwords on a regular basis
 Passwords should not be easy to break
 Strong passwords should contain:
 at least one capital letter
 at least one numerical value
 at least one other keyboard character (such as @, *, &. etc.)
 An example of a strong password would be: Sy12@#TT90kj=0
 An example of a weak password would be: GREEN
Exercise

Which of the following are weak passwords and which are strong passwords? Explain your
decision in each case.
i. 25-Apr-2005
ii. Password1
iii. ChapTer@06
iv. rX!3&tp%
v. 111111”

You might also like