1-ICT Topic 3
1-ICT Topic 3
(WWW)
Most widely used service on the Internet= World Wide Web
1 of 11
The Internet
2 of 11
Internet Use (1)
Internet Use:
3 of 11
Internet Use (2)
4 of 11
Internet use (3)
News Websites
Advantages- use RSS feeds to see latest stories, search archives to find old
stories
Disadvantages- posssible over-relaince rather than using a number of sources
User-generated websites (Wikis)- websites to which people can add their own
content
Advantages- up-to-date information with lots of peoples inforamtion
Disadvantages- anyone can add content, may be inaccurate/biased
Think before you share anything
Check and use your privacy settings
Don't befriend everyone
Make online albums private
Text and weblinks, Likes/Dislikes, New feeds
networking and personal VLE pages. You can add- Photos, Personal Information,
You can design your own websites and blogs. You can also personalise your social
Forums
Online photo albums
Personal websites
Personal page on VLE/work social media platforms
Social networking sites
Blogs
Types of personal space:
6 of 11
Personal spaces
5 of 11
Security measures
When you buy goods online or join a social networking site
you have to set up an account with a username and password.
You use the password to prove your identity.
Security questions are one example of a challenge-response
test. Some sites (e.g. banks) require you to answer security
questions as well as your password. This can be used to
identify yourself if you've forgotten your password.
Sites use CAPTCHA which is used to check that the form is not
being completed automatically by a software. There is no
software that can read the letters displayed.
Government sells personal details to private companies.
Organisations make money by selling personal information, e.g. the
Identity Theft
commit fraud
Hackers can find out your personal/financial information- use it to
Trojns record all of your key strokes/take pictures of your screen
computer
Hackers can install software called Trojaans to spy on your
Spyware
Covert data collection- You don't know the data is being collected
7 of 11
Information misuse
8 of 11
Preventing misuse
Cookies
Cookies track your browsing activity and are a major privacy concern. Users control
cookies by:
Any website that collects info from its customers should have a privacy policy
describing the website's use of cookies.
Phishing
Phishing emails are sent to get information out of people. Banks say they will never
conatct you by email asking for secure details.
Impersonal greeting, Threat, URL that doesn't take you to the bank website when
clicked, Request for personal information.
you're not sure about
Never click 'agree/ok' to close the window of a website
Read all security warnings
Only download programs from websites you trust
programs
-Be wary of downloading free music and movie file-sharing
-Install antispyware protection software
downloaded to your computer
-Use a firewall to prevent spyware being remotely
9 of 11
Preventing spyware
10 of 11
Legislation
Data Protection Act and Computer Misuse Act are designed to protect our privacy.
Data Protection Act 1988 (Put in place to protect us. Companies holding our data are
required by law):
To keep it secure
Not to ask for more data than necessary
Not to keep data for any longer than necessary
To keep data accurate and up to date
Not to use data for any other purpose without our consent
Computer Misuse Act (With the widespread use of the Internet it is now easier to
remotely log into a network or someone's computer to steal/corrupt data). The
computer misuse act lists three levels of crime: