Professional Documents
Culture Documents
Health Risk
Safety Risk
Health Risk
Caused
by
Damage to fingers
and wrists
Caused
by
Caused
by
Caused
by
Caused
by
Electrocution
Trailing Wire
Heavy equipment falling and causing injury
Fire risk
e-Safety
e-Safety is all about knowing how to use the internet safely and
responsibly.
The internet provides us with lots of different ways in which we can communicate
with each other. Some of these ways include:
Instant messaging - (WhatsApp, Viber, Kik etc.)
Social networking - (Facebook, Twitter, Instagram etc.)
Bloggs - (Huffington Post, Mashable, Life Hacker etc.)
Emailing
VoIP services - (Skype, Viber etc.)
Chatting in online games.
When used responsibly, all of these communication tools can make it extremely
easy for us to keep in contact with friends and family
For example:
If you have family who live in a different country, you can easily send a message
over WhatsApp and as soon as they are online they will receive it and respond.
Before the internet, we would have had to use a standard telephone, arrange a
time for the call to be made and incur a large phone bill.
How can you use the internet safely?
Never reveal personal information - including name, home address, phone number and
photograph
Only use web sites recommended by teachers or parents
Use search engines and web sites with filters so that inappropriate content can be filtered
out
Only open emails from people you know
Only open email attachments from people you know
Only accept social media friend requests from people you know
Use the privacy controls on social media - this will minimize the number of people who can read
your posts
Never arrange to face-to-face meet people that you have met online - if you do, then take an
adult with you and meet in a public place
Make sure that your parents know what you are doing online - this includes using social
media and chat rooms
Know how to block people on social media and in chat rooms - block people who send
unwanted messages/content
Report unwanted users - contact the owners of a chat room or social media site if you receive
inappropriate attention from other users
Never post or email pictures of yourself in school uniform
Never give out the name of your school.
Security of Data
Hacking
Phishing
Pharming
Spyware & Key-logging
Viruses
Spam
Forum
Cookies
What is Hacking
To gain unauthorized access to a computer system without the user knowledge or permission.
Most of the time, hackers will try to access the computer system using the internet.
Hackers will usually try to break into the system by simply guessing the password or by using
a key logger.
Hackers try to break into computers for the following reasons:
To delete, corrupt, copy and edit files.
Sensitive data could be sold to competitors.
Identity theft- to steal user identity
To expose a company ( for example wiki leaks)
To cause disruption and stop production
What are the effects of hacking?
Strategies to prevent hacking to Protect Data
The user will be tricked into entering their details into a fake website
The sender of the initial email will have gained personal details from the user.
These details can be used fraudulently or for identity theft.
Strategies to prevent Phishing
Use a filter on your email account so that only emails from an allowed users appear in your
inbox.
Always double check the URL and email address.
What is Pharming
Internet scamming practice in which malicious code is installed on a personal computer or
server, misdirecting users to fraudulent web sites without their knowledge or consent.
Pharming has been called “phishing without a lure”.
Effect of Pharming
A software which can monitor your use of the computer and monitor and log key pressed.
Spyware software will send the data back to person who planted the spyware software on
your computer.
This could include personal details like passwords and banking account information.
Spyware software could also install additional software to read cookie data and change
web browsing preferences.
Strategies to prevent Spyware
A computer virus is a piece of programming code/software which can install and replicate
itself onto a computer system without the user’s permission.
It’s effect can cause:
The computer to crash-become slower
Sometimes files can be deleted – leads to computer malfunction
Data files can be copied by the hacker or the files could be corrupted
Could stop production until the virus has been quarantined
Strategies to prevent computer virus
Forum
• Online forums are
interactive websites
where people can take
part in discussion
• Allow users to post their
own comments
unmoderated
Moderated Forum
All user’s comment will be check by the administrator before they are posted to the forum
Moderators will not allow any inappropriate comments
Users who continually to break the rules would likely get banned
Moderators make sure that rules are followed
Un-moderated Forum
Run anti-spyware software to make sure that your passwords are not being relayed back to anyone
Change passwords on a regular basis
Passwords should not be easy to break
Strong passwords should contain:
at least one capital letter
at least one numerical value
at least one other keyboard character (such as @, *, &. etc.)
An example of a strong password would be: Sy12@#TT90kj=0
An example of a weak password would be: GREEN
Exercise
Which of the following are weak passwords and which are strong passwords? Explain your
decision in each case.
i. 25-Apr-2005
ii. Password1
iii. ChapTer@06
iv. rX!3&tp%
v. 111111”