Communicating in the IT Industry

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Working with the Internet
POSSIBLE THREATS TO DATA
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Legislation in ICT.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Topic 5: Basic Security.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Information Systems Design and Development Security Precautions Computing Science.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
8 – Protecting Data and Security
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Data Protection GCSE ICT Mrs N Steventon-2005.
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Handling Personal Data
P.6 Impacts of Technology on society.
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Legislation in ICT.
Data Protection Act.
How to build a good reputation online
Digital Citizenship By: John Beverly.
Appropriate Use of Technology
Security of People, Property and Information
HOW DO I KEEP MY COMPUTER SAFE?
Legislation in ICT.
Internet Safety – Social Media
G061 - Network Security.
Communicating in the IT Industry
Communicating in the IT Industry
Principles of Information Technology
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Communicating in the IT Industry Lecture 8: Safety Zatil Ridh'wah Hj Darot

Safety: Learning objectives Personal Information Uploading and viewing digital content Respect towards others Data protection regulations Securing data

Personal information Electronic communications are quick and easy, but they also involve real dangers. Unlike paper-based records, electronic personal records can easily be transferred, stolen and misused. You need to remember _________ with your personal information, as not everyone is who they say they are on the Internet. Pedophiles and other criminals trawl social networking sites and IM (instant messenger) services looking for gullible people to take advantage of.

Criminals have been known to use social networking sites to collect information about passwords. For example, many people use their mother’s maiden name or their _________ as a password, and this information can sometimes be found on an individual’s pages on a social networking site. Although you may think you are well aware of the dangers, you should always be on guard. Think carefully before giving someone your phone number or address or, worse still, agreeing to meet them in person.

Uploading and viewing digital content When you upload digital content (such as photos and videos) to the Internet, remember that these often become ________________ , not just your friends and family. This material may therefore be used in ways that you did not originally intend. For example, employers might check the Facebook pages of people applying for jobs to check their character.

Respect towards others It is important to __________ the people that you communicate with on social networking sites. Negative or offensive comments can be seen by a much wider audience than you might imagine.

Data protection regulations Data Protection Act (1998) In the UK personal information about living individuals is protected by the Data Protection Act (1998). This law requires any company that keeps personal information about people on its computers to register with the Data Protection Registrar and to keep the eight Data Protection Principles. These principles are: Data may only be used for the purposes for which it was collected. Data must not be passed on to other people ____________ of the person whom it is about. People have a right of access to the information held about them. Personal information may be kept for no longer than is necessary and must be kept up to date.

Personal information may not be sent outside Europe unless the person whom it is about has agreed. All organizations that process personal information must register with the Information Commissioner’s Office. Organizations that keep personal information are required to have ___________in place. People have the right to have incorrect information about them corrected.

Securing data Encryption This is a method of encoding data so that only the intended recipient can decode it. For example, you can encrypt data on the hard drive of your computer so that if it is stolen the data cannot be read. You can also use encryption when connecting to the Internet over a wireless link. This is very important if you are sending ________ or confidential information (for example, Internet banking passwords and security information), as it is possible for other people to intercept wireless communications and misuse any information they collect.

Firewalls A firewall is a piece of software (or sometimes a dedicated hardware device) that examines all data arriving on your computer or network from the Internet and rejects any that break the firewall rules. This can _________ computers from becoming infected by certain types of viruses. Firewalls also help prevent hackers from gaining unauthorized access to systems.

Backups No method can guarantee to prevent data being lost or corrupted, so making regular backups is essential to keep important data safe. Secure sites When sending ___________ over the Internet (for example, entering passwords or credit card details on a web page), it is important that the page you are using is secure. Secure web pages encrypt the data you send so that if anyone else intercepts it they cannot view it.