0% found this document useful (0 votes)
11 views

E-safety

The document discusses the importance of e-safety and the need to keep personal data confidential when using computers and the internet. It outlines various security risks such as hacking, phishing, and viruses, along with methods to prevent these risks. Additionally, it emphasizes the significance of being vigilant and maintaining privacy settings across different devices.

Uploaded by

ganeszgk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

E-safety

The document discusses the importance of e-safety and the need to keep personal data confidential when using computers and the internet. It outlines various security risks such as hacking, phishing, and viruses, along with methods to prevent these risks. Additionally, it emphasizes the significance of being vigilant and maintaining privacy settings across different devices.

Uploaded by

ganeszgk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

M.

A ENGLISH
II YEAR

Safety and Security When Using Computers


Why personal data should be kept confidential?

As the use of computers continues to expand, the health risks and security risks continue to
increase. Many of these risks are associated with the internet which poses a great risk to
younger people unless they are vigilant at all times. But large businesses are also at risk from
hackers, pharming attacks and viruses, for example. Many of the precautions people and
business can take are common sense but, it also requires additional knowledge to know how to
protect yourself from these external attacks.

E‐safety

E‐safety refers to safety when using the internet, i.e. keeping personal data safe and applies to
any of the following devices:

 Mobile phones
 Computer or tablet
 Games console
 Wireless technology

Personal data refers to any data concerning a living person who can be identified either from
the data itself from the data in conjunction with other information. Examples of personal data
include:

 Name
 Address
 Date of birth
 Medical history
 Banking details

Some personal data is often referred to as sensitive personal data and includes:

 Ethnic origin
 Political views
 Religion
 Criminal activity

E‐safety also refers to the benefits, risks and responsibilities when using ICT. The following list
gives some idea of the e‐safety issues that can be encountered by users of ICT hardware:

 Don’t give out any personal information to people who are unknown to you.
M.A ENGLISH
II YEAR

 Don’t send people photos of yourself, either online or via a mobile phone.
 Always maintain your privacy settings on whatever device is being used online or during
communications.
 When accessing the internet make sure the websites being visited can be trusted.
 Only open emails from known sources.
 Only email people you know. Think carefully before opening an email.
 It is extremely important to be vigilant when using social networking sites, instant
messaging or chat rooms.

Security of data

There are a number of security risks associated with any electronic device that connects to a
network. The following covers a range of security risks to data:

 Hacking
 Phishing
 Pharming
 Smishing
 Vishing
 Spyware
 Viruses
 Spam

Hacking

Description

This is the act of gaining unauthorized access to a computer system.

Possible effects

 This can lead to identity theft or misuse of personal information


 Data can be deleted, changed or corrupted on a user’s computer

Methods to help prevent the security risk

 Use of firewalls
 Use of strong passwords and user IDs
M.A ENGLISH
II YEAR

Phishing

Description

The creator sends a legitimate‐looking email to target users. As soon as the recipient
clicks on a link in the email or attachment, they are sent to a fake website or they are
fooled into giving personal data in replying to the email. The email often appears to come
from a trusted source, such as a bank or a well‐known service provider.

Possible effects

 The creator of the email can gain personal data, such as bank account data or
credit card numbers, from the user.
 This can lead to fraud or identity theft.

Methods to help prevent the security risk

 Many ISPs or web browsers filter out phishing emails.


 Users should always be cautious when opening emails or attachments.
 Don’t click on executable attachments that end in .exe, .bat, .com or .php for
example.

Pharming

Description

This a malicious code installed on a user’s computer or on a web server, the code will
redirect the user to a fake website without their knowledge.

Possible effects

 The creator of the malicious code can gain personal data such as credit/debit card
details from users when they visit the fake website, usually the website appears to
be that of a well‐known trusted company.
 Pharming can lead to fraud or identity theft.

Methods to help prevent the security risk

 Some anti‐spyware can identify and remove pharming code from a user’s
computer.
 The user should always be alert and look out for clues that they are being
redirected to another website.
M.A ENGLISH
II YEAR

Smishing

Description

Short for SMS phishing, uses the SMS system of mobile phones to send out fake text
messages. It is very similar to phishing.

Possible effects

 These scams often contain a URL or telephone number embedded in the text
message. The recipient will be asked to log on to the website or make a telephone
call. If they do, they will be asked to supply personal details such as credit/debit
card numbers or passwords. As with phishing attacks, the text message will appear
to come from a legitimate source and will make a claim, for example, that they
have won a prize or that they need to contact their bank urgently.

Vishing

Description

Vishing (voice mail phishing) is another variation of phishing.

Possible effects

 This uses a voice mail message to trick the user into calling the telephone number
contained in the message. As will all phishing attacks, the user will be asked to
supply personal data thinking they are talking to a legitimate company.

Spyware

Description

This is software that gathers data by monitoring key presses on the user’s keyboard. The
generated data is then sent back to the person who sent the software.

Possible effects

 Spyware gives the originator access to all data entered using a keyboard on the
user’s computer.
 The software is able to install other spyware, read cookie data and also change a
user’s default browser.

Methods to help prevent the security risk

 Use anti‐spyware software to reduce the risk.


M.A ENGLISH
II YEAR

 The user should always be alert and check for clues that their keyboard activity is
being monitored.

Viruses

Description

This is a program code or software that can replicate/copy itself with the intention of
deleting or corrupting files on a computer. They often cause the computer to
malfunction, for example, by filling in the hard drive with data.

Possible effects

 Viruses can cause the computer to crash, stop functioning normally or become
unresponsive.
 The virus can delete files or data stored on a computer.
 It can corrupt operating system files, making the computer run slowly or even
crash.

Methods to help prevent the security risk

 Install anti‐virus software and update it regularly.


 Don’t use software from unknown sources.
 Be careful when opening emails or attachments from unknown senders.

Spam

Description

Spam, often referred to as junk email, is usually sent out to a recipient who is on a
mailing list or mailing group.

Possible effects

 Spammers obtain these email addresses from chat rooms, websites, newsgroups
and even certain viruses that have been set up to harvest a user’s contact list.
 While spam is rarely a security risk, it can lead to denial of services, for example,
by clogging up the bandwidth on the internet. However, spam can be linked to
phishing attacks or even the spread of computer viruses, so it should be treated
with some caution.

Methods to help prevent the security risk

 Many ISPs filter out spam or junk mail.


 When using the junk email filter, set the protection level to high.
M.A ENGLISH
II YEAR

 Look out for check boxes that are already selected when items are bought online.
 Do not reply to an email that seems to have come from an unknown source.

You might also like