Questions and Answers
Which of the following is NOT considered a health risk associated with daily contact with information systems?
What is the primary focus of e-safety?
Which of the following is an example of an inappropriate contact hazard in e-safety?
What can heavy equipment falling potentially lead to?
Signup and view all the answers
Which of the following is NOT listed under safety aspects?
Signup and view all the answers
Which of the following health risks is specifically associated with long hours in front of a screen?
Signup and view all the answers
What type of hazard does e-safety address?
Signup and view all the answers
Which of the following safety risks can be caused by trailing wires?
Signup and view all the answers
Which of the following is a health risk that could prevent effective work performance?
Signup and view all the answers
What type of risks might arise from engaging with social network software in e-safety?
Signup and view all the answers
Which of the following actions can lead to e-safety issues?
Signup and view all the answers
What should a user consider before disclosing personal information online?
Signup and view all the answers
What is hacking primarily associated with?
Signup and view all the answers
Which of the following is NOT categorized under physical security threats?
Signup and view all the answers
What characteristic defines phishing attacks?
Signup and view all the answers
What is an appropriate way to maintain internet security?
Signup and view all the answers
Which method does NOT fall under the category of social engineering?
Signup and view all the answers
What is the primary goal of smishing?
Signup and view all the answers
Which of the following is a suggested strategy for preventing e-safety issues?
Signup and view all the answers
What does pharming typically involve?
Signup and view all the answers
What is the primary goal of phishing attacks?
Signup and view all the answers
How does pharming differ from phishing?
Signup and view all the answers
Which of the following describes smishing?
Signup and view all the answers
What is the main characteristic of vishing?
Signup and view all the answers
Which of the following is NOT a form of malware?
Signup and view all the answers
What distinguishes a computer virus from other types of malware?
Signup and view all the answers
Which type of malware is specifically designed to collect personal information covertly?
Signup and view all the answers
What is a common method used by attackers in phishing attacks to lure victims?
Signup and view all the answers
What type of malware can operate undetected and provide remote access to a computer?
Signup and view all the answers
What is the main risk associated with malware such as ransomware?
Signup and view all the answers
What is the primary function of a Trojan Horse in computer security?
Signup and view all the answers
How do worms primarily spread across computer systems?
Signup and view all the answers
What distinguishes spyware from other types of malicious software?
Signup and view all the answers
Which statement accurately describes adware?
Signup and view all the answers
What is the main purpose of a rootkit?
Signup and view all the answers
Which of the following is NOT a characteristic of a worm?
Signup and view all the answers
What method can a Trojan Horse use to install itself on a victim's computer?
Signup and view all the answers
What is a common misconception about adware?
Signup and view all the answers
Which type of malware typically results in a user’s data being stolen without their knowledge?
Signup and view all the answers
How can a computer be protected against worms effectively?
Signup and view all the answers
Study Notes
Safety and Security Overview
- Increase in ICT usage correlates with physical dangers in the workplace, categorized into health and safety aspects.
Health Aspects
- Daily exposure to computer-based information systems (CBIS) can lead to health issues.
- Common health risks include:
- Back and neck strain
- Eye strain
- Frequent headaches
Safety Aspects
- Safety risks in the workplace can cause serious injuries or fatalities.
- Examples of safety risks include:
- Electrocution from faulty equipment
- Tripping hazards from trailing wires
- Injuries from heavy equipment falls
- Risks associated with electrical overloads
- Fire hazards due to poor electrical management
E-safety
- E-safety encompasses keeping personal data secure while using the internet and electronic media.
- It addresses the benefits, risks, and responsibilities associated with information systems.
E-safety Hazards
- Hazards related to e-safety can be categorized into:
-
Illegal/Inappropriate Content
- Copyright violations
- Plagiarism
- Exposure to inappropriate images
-
Contact Risks
- Inappropriate interactions with adults
- Bullying
- Financial scams
-
Illegal/Inappropriate Content
Common E-safety Issues
- Risks include:
- Sharing personal information with unknown individuals
- Sending personal photos online
- Poor management of privacy settings on devices
- Visiting unsecured websites
- Opening emails from unknown senders
- Engaging in cyberbullying through social networks
Managing E-safety Issues
- To safeguard personal data:
- Adjust privacy settings on social networks.
- Evaluate the purpose of shared information by asking:
- Who collects the information?
- Why is it necessary?
- What will happen with it?
- What are the potential consequences?
- Utilize updated antivirus and security software.
Physical Security and Data Protection
- Data security risks include:
- Hacking
- Phishing
- Smishing (SMS phishing)
- Vishing (voice phishing)
- Pharming
Definitions of Cybersecurity Threats
- Hacking: Unauthorized access to a computer system, leading to identity theft, data manipulation, or corruption.
- Phishing: Deceptive emails targeting personal data by impersonating trustworthy entities.
- Pharming: Redirecting users to fraudulent websites without consent through malicious code.
- Smishing: Phishing via SMS messages rather than email.
- Vishing: Phishing through phone calls to extract personal information.
Malware Types
- Malware disrupts computer systems and includes:
- Viruses: Self-replicating programs that corrupt data.
- Trojan Horses: Malicious programs disguised as legitimate software.
- Worms: Programs that exploit network vulnerabilities for replication.
- Spyware: Monitors user actions and collects data.
- Adware: Displays targeted ads based on user activity.
- Rootkits: Provides unauthorized administrative access to computers.
Summary of Malware Impact
- Virus: Malicious software that causes system malfunction or data loss.
- Trojan Horse: Disguised malicious software that acts like a legitimate application.
- Worms: Self-replicating software exploiting security flaws.
- Spyware: Collects data by monitoring user input.
- Adware: Targets users with advertisements based on online behavior.
- Rootkit: Allows for covert access to a victim's system after password compromise.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz focuses on the safety and security aspects of Information and Communication Technology (ICT) as discussed in Lecture 7. It covers health and safety dangers that employees may encounter due to the increased use of ICT. Test your knowledge on these critical issues.