Ict WB Answers - c8
Ict WB Answers - c8
Fire Improper ventilation of air Make sure air vents are not
vents, plugging multiple covered and there is proper
devices into a single electrical ventilation, do not plug too
supply outlet, leaving many devices into the same
equipment unattended for a outlet, turn off devices when
long time not in use, have a CO 2 fire
extinguisher handy
Tripping over cables long or tangled wires across Use cable covers to encase
the floor wires, conceal wires under
desks or carpets, use wireless
technology for reducing wires
A:
Personal data refers to any detail used to identify an individual. For example, it is
easy to identify a person from their phone number or if you know their medical
history and name.
• Personal details can be stolen, copied, and sold to third parties without your
knowledge.
• Sharing of bank, financial and medical details can lead to fraudulent activities.
• Social networking sites could reveal personal information and identity theft.
They can also lead to cyberbullying. Sharing one’s location is common
practice on social networking sites and has led to cases of kidnapping and
theft, etc.
• Online gaming is also a source of cyber-attacks on a user’s computer or
mobile phone. Viruses, phishing or spyware are the most common issues.
• Chat rooms also pose the potential risk of users sharing too much personal
information.
• Some websites are inappropriate for young people, exposing them to
offensive or undesirable content.
3. What strategies could you use to minimise the potential dangers when
online?
A:
Do not:
● access sites that are a known source of viruses
● visit sites with violent, inappropriate, or offensive content
● open untrusted web pages, advertisements, or pop ups
Do:
● use an age-appropriate learner search engine to have access to relevant
websites
● use parental controls to avoid inappropriate sites
● access only trusted websites that are recommended by teachers or carers
4. What strategies could you use to minimise the potential dangers when
using email?
A:
Do not:
● read any content of emails from unknown or untrusted sources
● open any attachment of emails from unknown or untrusted sources
● reveal any personal details to people you don’t know or trust via email
● send any attachments or personal photos to an unknown source via email
Do:
● avoid clicking on links in untrusted emails, as these could be phishing and
provide false information
● avoid sharing any personal data via emails, as can be misused if your account
is hacked
● avoid opening any file attachments from an unknown source as it may contain
malicious or offensive content
● avoid sharing any pictures/picture in school uniform, as this is also your
personal data can lead to identity theft
● use blockers to avoid pop-up advertisements
● only email people you already know
A:
Do not:
● share your real name while creating accounts or playing games
● share any personal details like your address, passwords etc., as this could
lead to bullying/ stalking
● share your password with anyone
● use voice chat or webcam
Do:
● install antivirus/anti-spyware software on your computer to help protect
against malware and identity theft
● buy new and downloadable games from legitimate sources to avoid virus
attacks on your computer system
● report abusive/unwanted users.
A:
Hacking means gaining illegal or unauthorized access to someone’s computer
system or a network. It is usually done using the internet and through remote
access. The people that do this are known as hackers. Hacking is often done with
the intention of harming or damaging a system or someone’s work. A hacker can
delete, remove, or change files on a system without permission.
2. Explain the measures that must be taken in order to protect data from
being hacked.
A:
• login credentials (username and password) for authentication
• encryption of data
• avoid clicking on random links or attachments sent over email.
• firewalls
• biometrics
• digital certificates
3. Explain what is meant by the terms user id and password stating their
purpose and how they are used to increase the security of data.
A:
A user ID and a password are often required for logging into different
accounts to access secure information. A user ID is a unique piece of data
assigned to a user.
4. Explain what is meant by the term biometric data and why biometric
data is used.
A:
Biometrics involves scanning human features to authenticate someone’s
identity. Biometrics is a more secure way of data protection:
• Human features cannot be forgotten unlike a user id or password.
• Impressions of body parts are unique for every individual, and no one can
copy or fake them.
5. Explain what is meant by the term digital certificate and its purpose.
A:
A digital certificate is an electronic document with an additional security layer
used to store the key that contains the identity of the owner of data. This is called
the public key. The content of the certificate is verified by a third-party or a
company, which also provides the digital signature of the owner of the certificate.
This helps in establishing trust between the user and the internet browser or a
website.
A:
SSL is a standard security layer, or a certificate added to the HTTP protocol.
When this security feature is added, HTTP is called HTTPS. This means that
data is encrypted and secured prior to being transmitted online, and a public
encryption key is required to decipher the data shared.
SSL certificates have a key pair: a public and a private key. These keys work
together to establish an encrypted connection between the server and the
client computer. The certificate also contains what is called the ‘subject’,
which is the identity of the certificate/website owner. When an SSL certificate
is issued to a website, the transactions made by a credit card through that
website becomes trustworthy and secure.
A:
The web address will start HTTPS rather than HTTP. It may also have a locked
padlock icon next to the URL.
A:
a. Phishing: Phishing refers to the act of luring users to give away
sensitive personal information such as bank account details, credit card
details, login credentials etc., for carrying out fraudulent activities.
Phishing methods include fake websites or emails that look genuine
and trick users into giveaway personal sensitive information. For
example, if a user receives an email from their bank that their account
password is due to expire. Once the user clicks on the ‘Change
Password’ link, the website redirects to a fake page, tricking the user to
enter all login credentials. These are captured and used for fraudulent
activity such as moving money transactions from the account
A:
How to Prevent a Pharming Scam:
• Outdated security software leaves your network vulnerable. Keep this up to
date. Run regular
• antivirus checks and spyware removal software to add an additional layer of
safety.
• Change the default password on your Wi-Fi router. When a scammer tries to
access your computer, the first place they will check is the router. If the router
still has the default password, your network is vulnerable to attack.
• Be aware of what websites you visit. Fraudulent websites can install malicious
software or browser extensions on your computer that will modify the DNS
cache.
• Be careful of any emails you open. An email attachment can also contain
malware. Always make
• sure the email is sent from a known or reputed source.
• Look out for misspelt words, grammatical mistakes, subtle changes in the
design of the website
• along with any links such as ’contact us’ that are not working, etc.
A:
A:
A moderated forum is one where any posts made will be checked by an admin
before it can be viewed by others. All comments are also checked before being
shown to ensure only posts/comments that meet the forum rules are shown. In an
unmoderated forum, there may be comments/posts which don’t meet the rules
and may be offensive.
12. Explain the concept of and how to recognise spam mail and avoid being
drawn into it.
A:
When you receive an email into your inbox, it is important to know which
category it
falls into. Some emails are relevant, but others are unwanted unsolicited
emails,
sent out in bulk and referred to as spam or junk mail. An email categorised as
spam usually
contains unwanted messages such as advertisements and promotions. It is
possible that these messages may contain unethical and dangerous
information, links, or attachments (phishing). Some service providers
automatically filter and mark these messages from unknown senders as spam
or junk.
A:
A secure transfer of data requires a secure connection between the two
devices. This involves a secure http or HTTPS. The data packets
(information) are converted into a form that can only be understood by the
person who changed it (has the key). This process is called encryption of
data.
The data is not unencrypted as it is transmitted across the network, only when
the data reaches the intended destination. This is known as decryption.
The main purpose of encrypting data is so that criminals such as hackers
cannot access the private and confidential information, as they would be
unable to decipher the encryption.
The encryption process requires the devices at either end of the transfer to
use an encryption key to unscramble the secure data. This technology can be
used to protect data in a hard disk, email, cloud, or HTTPS websites from
being accessed by unauthorised users.
14. Define the term computer virus and describe its effects.
A:
15. Describe how to take preventative action to avoid the danger of infecting
a computer with a virus from a downloaded file.
A:
To guard against this type of behaviour, a network should have anti-malware
and anti-virus
applications installed, which protects all devices on the network.
16. Describe the measures that must be taken in order to protect against
hacking.
A:
• login credentials (username and password) for authentication
• encryption of data
• avoid clicking on random links or attachments sent over email.
• firewalls
• biometrics
• digital certificates
A:
• Shoulder surfing: spying on someone while they use a cash-dispensing
machine, such as an ATM or other electronic device to obtain their personal
identification number (PIN), password, etc.
• Card cloning: also known as skimming, this technique involves attaching a
data skimming device to the card reader slot to copy information from the
magnetic strip, or cameras to record the keystrokes.
• Keylogger: Keyboard capturing using a key logger software without
permission.
A:
Data stored on the cloud can be accessed from any computer with internet
access and therefore is more susceptible to hacking then data stored on a single
computer.
A:
A:
Having passwords has some effectiveness as if someone doesn’t know the
password they won’t be allowed to gain entry. Using biometrics is more
secure than using passwords as they can’t be shared with someone else.
A firewall is a stronger method of security as all data going in and out of the
network will be checked.
A:
A:
• E-safety protects personal data from people who should not have access to it
• Personal data needs to be kept safe so that others cannot use it against us
• Protects sensitive data
• Use of e-safety protects vulnerable people
• Protects other people’s views
• If someone has access to your personal data this could be used for blackmail
/ spreading rumours / identity theft / stalking
• E-safety reduces the risks when using ICT using social media sites, online
gaming users believe they are safe
• E-safety trains users to be responsible on the internet
• Giving out personal information can help predators to find out further details
about a person, such as where they live / where they go to school / used to
track the person
• People on the internet may not be what they seem
• Need to be able to block people on the internet
• Need to know how to report problems on the internet
• If we do not use e-safety then users are being put at risk as they will not know
the dangers
• Freedom of speech can be affected
• If we do not apply e-safety approaches we open ourselves up to attack
• Use of netiquette
• Covers a number of electronic devices like, computers, tablets, mobile
phones, games consoles
A:
• Don’t give out personal information to people you do not know
• Don’t send photos of yourself to people you do not know
• Don’t post photos of yourself on the social media without privacy settings
being set
• Don’t post photographs that could be linked to you
• Maintain privacy settings
• Only make friends with people you know/known to other friends
• Don’t enter private chat rooms
• Do not post email addresses/real addresses/real names, etc.
• Do not reply to or communicate with people you do not know
A:
• Monitors and controls incoming and outgoing data traffic
• Helps to prevent malware being downloaded
• Prevents computer accessing undesirable/unauthorised sites
• Prevents unauthorised users accessing the computer
• Keeps a list of undesirable sites/IP addresses
• Keeps a list of acceptable sites/IP addresses
• Warns you of threats
• Allows you to accept/reject downloaded programs
A:
• A virus is a piece of software/program code
• It infects a computer
• Attaches itself to files
• Has the ability to replicate itself
A:
• Do not reply to spam emails
• Use a spam email filter
• Block images in HTML messages as these are used as web beacons
• Unclick check boxes when buying items online
• Do not sign up to commercial mailing lists
A:
a. Phishing:
• Be careful when opening emails from people you do not know
• Be careful when opening attachments from people you do not know
• Do not click on executable (.exe) files / batch (.bat) files sent to you
• Never give out bank details / PIN / passwords / personal details in an email
• Report any phishing attempts
• Do not respond to emails from addresses you do not recognise
b. Pharming:
• Use anti-spyware to remove pharming code
• Check sites carefully before a link is clicked
• Delay using a link sent in an email as some sites are time related
• Check the URL / web address of the website before you enter personal details
• Make sure you are on a secure website
c. Smishing:
• Never give your bank details / PIN / password/personal details over the phone
/ text message
• Ignore text messages from numbers you do not recognise
• Report any smishing attempts
• Never click on links in text messages from unexpected people
• Never phone the phone numbers that are given in a suspect text message
11. Explain what is meant by the term biometric data and why biometric
data is used.
A:
Biometric data includes fingerprints, Retina scans, Voice recognition, Iris scans,
Handprint
Why it is used:
• The biometric data is unique to the user
• Biometric data is always with you
• Passwords can be copied/forgotten/guessed/cracked
• Difficult to copy/forge biometric data
• Eliminates shoulder surfing
• Prevents key logging software
12. Describe the features of a web page that identify it as using a secure
server.
A:
• The web address should start with https
• There is a closed/green padlock
• When the padlock is clicked a message will state the connection is
encrypted/secure
• The web page has a digital/SSL certificate
• The green padlock shows it has an Extended Validation (EV) certificate/CA
certificate
A:
• Electronic Junk email/unsolicited emails/sent to a person without requesting it
• Deliberate filling up of a user’s inbox/many emails sent at once
• Emails sent to everyone on the mailing list
A:
a. Phishing:
• Uses the internet
• Redirects the user to a fake website
• Can lead to fraud and identity theft
• Uses websites that look legitimate
• Personal data is compromised
• Emails are sent to the computer
• Clicking a link sends user to a fake website
• The email appears to have come from a trusted source
• Uses communication devices to collect personal data
• Requires the user to communicate quickly
• Requires the user to enter personal data
b. Pharming:
• Uses the internet
• Redirects the user to a fake website
• Can lead to fraud and identity theft
• Uses websites that look legitimate
• Personal data is compromised
• Malicious code is uploaded to the computer
• The code redirects the user to a fake website without their knowledge
• Website appears to be genuine
• Spyware can be used to record key presses
c. Smishing:
• Uses communication devices to collect personal data
• Requires the user to communicate quickly
• Requires the user to enter personal data
• Uses the internet
• Fake text messages/SMS are sent to a phone
• The user may be asked to make a phone call
• Smishing messages tend to use 5000 in the message