Rachel Murphy 255275 Assignsubmission File Task 2-Threats of Using Online Communication Marked
Rachel Murphy 255275 Assignsubmission File Task 2-Threats of Using Online Communication Marked
There are a number of threats of going online, mostly cyberbullying, spam, phishing, pharming, and denial of service attacks. Here is some information on these threats.
Cyber Bullying - Cyber bullying is when the internet or mobile phones are used to
send vicious and unpleasant messages to others with the direct intention of upsetting them. Most messages sent to cyberbully are often anonymous. Main threat-suicide
Always speak out if you or someone you know is being cyberbullied to prevent it from happening to someone else.
Rachel Murphy
L2 COMPUTING
Spam - Spam is the use of electronic messaging systems to send bulk messages to large
quantities of people.
Rachel Murphy
L2 COMPUTING
Rachel Murphy
L2 COMPUTING
Legislation
Data Protection Act some of these are listed below and these all protect data within
the computer system. 1. Data must be collected and used only within law and fairly. 2. Data must only be held and used for the reasons given to the information commissioner. 3. Data must only be used for registered purposes and only be disclosed to people mentioned with the register entry. It must not be given away or sold. 4. The information held must be adequate, relevant and mot excessive when compared with the purpose stated in the register. 5. Data must be accurate and kept up to date.
Rachel Murphy 5 L2 COMPUTING
6. Data must not be kept for longer than necessary for the registered purpose. 7. The information must be kept safe and secure. This also includes information being backed up and away from any unauthorised access. 8. Dad must not be transferred outside of the European Economic Area.
Copyright
Copyright is a type of legal protection for creative things such as recorded, stored, wrote down in some way. Copyright covers things such as, books, images, music, films, and video. This allows the person who created it to have almost total control over whether or not other people can use or copy what the person has made. Every photo, song, book and website is protected and has the copyright symbol and if someone wants to use music or photos they have to pay to gain permission to use it.
Plagiarism
Plagiarism is when someone uses text from a book, the internet or something that someone has said and uses it as their own work and doesnt give the person who owns it credit for it.
Rachel Murphy
L2 COMPUTING
Bibliography http://www.bullyingstatistics.org/content/bullying-andsuicide.html http://www.deletecyberbullying.org/preventingcyberbullying/ http://answers.yahoo.com/question/index?qid=201101140545 27AAdnxPf http://www.spamlaws.com/spam-stats.html http://www.kaspersky.co.uk/internet-securitycenter/threats/spam-phishing http://www.privacymatters.com/identity-theftinformation/phishing.aspx http://searchsecurity.techtarget.com/definition/pharming http://ed271phishingandpharming.weebly.com/statistics.ht ml http://securityresponse.symantec.com/norton/clubsymantec /library/article.jsp?aid=cs_prevent_pharming http://answers.yahoo.com/question/index?qid=201012152037 22AACfE1A http://hackmageddon.com/tag/denial-of-service-attack/ http://www.wikihow.com/Keep-Your-Blog-Safe http://www.socialmediaexaminer.com/5-steps-to-ensureyour-wordpress-blog-is-secure/ http://in.answers.yahoo.com/question/index?qid=200904102 21346AALDf6q
Rachel Murphy 7 L2 COMPUTING
http://in.answers.yahoo.com/question/index;_ylt=AvsiF70U XKFTvLAwGHs.Fr5OSBV.;_ylv=3?qid=20100304071538AAl5FL0 http://uk.ask.com/question/why-is-it-dangerous-todownload-files-from-the-internet http://uk.ask.com/question/why-is-it-dangerous-todownload-files-from-the-internet http://uk.ask.com/question/what-are-the-dangers-ofopening-email-attachments http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/0dat aprotectionactrev5.shtml http://answers.yahoo.com/question/index?qid=201104120222 14AAaYwGi http://in.answers.yahoo.com/question/index?qid=201103272 13426AAy7Fgs http://answers.ask.com/computers/science/what_is_the_com puter_misuse_act
Rachel Murphy
L2 COMPUTING