Safety and Security in ICT
40 Questions
2 Views

Safety and Security in ICT

Created by
@WorthySugilite678

Questions and Answers

Which of the following is NOT considered a health risk associated with daily contact with information systems?

  • Heavy equipment falling (correct)
  • Eye strain
  • Headaches
  • Back and neck problems
  • What is the primary focus of e-safety?

  • Ensuring personal data safety while using information systems (correct)
  • Reducing the costs associated with electronic communication
  • Maintaining employee productivity in the workplace
  • Avoiding physical health issues related to ICT
  • Which of the following is an example of an inappropriate contact hazard in e-safety?

  • Plagiarism (correct)
  • Eye strain
  • Back and neck problems
  • Electrocution
  • What can heavy equipment falling potentially lead to?

    <p>Serious injury or loss of life</p> Signup and view all the answers

    Which of the following is NOT listed under safety aspects?

    <p>Bullying</p> Signup and view all the answers

    Which of the following health risks is specifically associated with long hours in front of a screen?

    <p>Eye strain</p> Signup and view all the answers

    What type of hazard does e-safety address?

    <p>Inappropriate contact and content risks</p> Signup and view all the answers

    Which of the following safety risks can be caused by trailing wires?

    <p>Trip hazards</p> Signup and view all the answers

    Which of the following is a health risk that could prevent effective work performance?

    <p>Back and neck problems</p> Signup and view all the answers

    What type of risks might arise from engaging with social network software in e-safety?

    <p>Bullying and inappropriate contact</p> Signup and view all the answers

    Which of the following actions can lead to e-safety issues?

    <p>Opening emails from unknown sources</p> Signup and view all the answers

    What should a user consider before disclosing personal information online?

    <p>Who is collecting the information and why</p> Signup and view all the answers

    What is hacking primarily associated with?

    <p>Unauthorized access to computer systems</p> Signup and view all the answers

    Which of the following is NOT categorized under physical security threats?

    <p>Social engineering</p> Signup and view all the answers

    What characteristic defines phishing attacks?

    <p>Fraudulent attempts to obtain sensitive information</p> Signup and view all the answers

    What is an appropriate way to maintain internet security?

    <p>Using antivirus software and keeping it updated</p> Signup and view all the answers

    Which method does NOT fall under the category of social engineering?

    <p>Hacking</p> Signup and view all the answers

    What is the primary goal of smishing?

    <p>Obtaining information through deceptive text messages</p> Signup and view all the answers

    Which of the following is a suggested strategy for preventing e-safety issues?

    <p>Regularly evaluating personal social media usage</p> Signup and view all the answers

    What does pharming typically involve?

    <p>Redirecting users to fraudulent websites</p> Signup and view all the answers

    What is the primary goal of phishing attacks?

    <p>To gather personal data by pretending to be a trustworthy source.</p> Signup and view all the answers

    How does pharming differ from phishing?

    <p>Pharming installs malicious code to redirect users, while phishing uses deceptive communication.</p> Signup and view all the answers

    Which of the following describes smishing?

    <p>Phishing carried out via SMS text messages.</p> Signup and view all the answers

    What is the main characteristic of vishing?

    <p>Employing telephone calls to trick users into revealing personal data.</p> Signup and view all the answers

    Which of the following is NOT a form of malware?

    <p>Phishing</p> Signup and view all the answers

    What distinguishes a computer virus from other types of malware?

    <p>It replicates with the intention to damage or corrupt files.</p> Signup and view all the answers

    Which type of malware is specifically designed to collect personal information covertly?

    <p>Spyware</p> Signup and view all the answers

    What is a common method used by attackers in phishing attacks to lure victims?

    <p>Encouraging the user to click on a link.</p> Signup and view all the answers

    What type of malware can operate undetected and provide remote access to a computer?

    <p>Rootkit</p> Signup and view all the answers

    What is the main risk associated with malware such as ransomware?

    <p>It encrypts files and demands payment to restore access.</p> Signup and view all the answers

    What is the primary function of a Trojan Horse in computer security?

    <p>To disguise itself and act like a harmless application</p> Signup and view all the answers

    How do worms primarily spread across computer systems?

    <p>By exploiting security holes in networks</p> Signup and view all the answers

    What distinguishes spyware from other types of malicious software?

    <p>It monitors user keystrokes and collects data</p> Signup and view all the answers

    Which statement accurately describes adware?

    <p>It displays targeted advertisements based on user behavior</p> Signup and view all the answers

    What is the main purpose of a rootkit?

    <p>To gain and maintain administrator access</p> Signup and view all the answers

    Which of the following is NOT a characteristic of a worm?

    <p>It requires user interaction to spread</p> Signup and view all the answers

    What method can a Trojan Horse use to install itself on a victim's computer?

    <p>By masquerading as an update for legitimate software</p> Signup and view all the answers

    What is a common misconception about adware?

    <p>It does not collect user data</p> Signup and view all the answers

    Which type of malware typically results in a user’s data being stolen without their knowledge?

    <p>Spyware</p> Signup and view all the answers

    How can a computer be protected against worms effectively?

    <p>By using firewalls and regular software updates</p> Signup and view all the answers

    Study Notes

    Safety and Security Overview

    • Increase in ICT usage correlates with physical dangers in the workplace, categorized into health and safety aspects.

    Health Aspects

    • Daily exposure to computer-based information systems (CBIS) can lead to health issues.
    • Common health risks include:
      • Back and neck strain
      • Eye strain
      • Frequent headaches

    Safety Aspects

    • Safety risks in the workplace can cause serious injuries or fatalities.
    • Examples of safety risks include:
      • Electrocution from faulty equipment
      • Tripping hazards from trailing wires
      • Injuries from heavy equipment falls
      • Risks associated with electrical overloads
      • Fire hazards due to poor electrical management

    E-safety

    • E-safety encompasses keeping personal data secure while using the internet and electronic media.
    • It addresses the benefits, risks, and responsibilities associated with information systems.

    E-safety Hazards

    • Hazards related to e-safety can be categorized into:
      • Illegal/Inappropriate Content
        • Copyright violations
        • Plagiarism
        • Exposure to inappropriate images
      • Contact Risks
        • Inappropriate interactions with adults
        • Bullying
        • Financial scams

    Common E-safety Issues

    • Risks include:
      • Sharing personal information with unknown individuals
      • Sending personal photos online
      • Poor management of privacy settings on devices
      • Visiting unsecured websites
      • Opening emails from unknown senders
      • Engaging in cyberbullying through social networks

    Managing E-safety Issues

    • To safeguard personal data:
      • Adjust privacy settings on social networks.
      • Evaluate the purpose of shared information by asking:
        • Who collects the information?
        • Why is it necessary?
        • What will happen with it?
        • What are the potential consequences?
      • Utilize updated antivirus and security software.

    Physical Security and Data Protection

    • Data security risks include:
      • Hacking
      • Phishing
      • Smishing (SMS phishing)
      • Vishing (voice phishing)
      • Pharming

    Definitions of Cybersecurity Threats

    • Hacking: Unauthorized access to a computer system, leading to identity theft, data manipulation, or corruption.
    • Phishing: Deceptive emails targeting personal data by impersonating trustworthy entities.
    • Pharming: Redirecting users to fraudulent websites without consent through malicious code.
    • Smishing: Phishing via SMS messages rather than email.
    • Vishing: Phishing through phone calls to extract personal information.

    Malware Types

    • Malware disrupts computer systems and includes:
      • Viruses: Self-replicating programs that corrupt data.
      • Trojan Horses: Malicious programs disguised as legitimate software.
      • Worms: Programs that exploit network vulnerabilities for replication.
      • Spyware: Monitors user actions and collects data.
      • Adware: Displays targeted ads based on user activity.
      • Rootkits: Provides unauthorized administrative access to computers.

    Summary of Malware Impact

    • Virus: Malicious software that causes system malfunction or data loss.
    • Trojan Horse: Disguised malicious software that acts like a legitimate application.
    • Worms: Self-replicating software exploiting security flaws.
    • Spyware: Collects data by monitoring user input.
    • Adware: Targets users with advertisements based on online behavior.
    • Rootkit: Allows for covert access to a victim's system after password compromise.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz focuses on the safety and security aspects of Information and Communication Technology (ICT) as discussed in Lecture 7. It covers health and safety dangers that employees may encounter due to the increased use of ICT. Test your knowledge on these critical issues.

    More Quizzes Like This

    Online Safety and ICT Quiz
    6 questions
    E-Safety for ICT Users
    43 questions
    Use Quizgecko on...
    Browser
    Browser