Lecture 7 - Safety & Security PDF
Document Details
Uploaded by Deleted User
University of Ghana
2024
Dr. De-Graft Johnson Amenuveve Dei
Tags
Summary
This lecture provides an overview of safety and security issues related to ICT use, including health, safety, e-safety, and security of data. Topics covered include various cyber threats like hacking, phishing, smishing, vishing, and pharming, along with how to mitigate such threats.
Full Transcript
Lecture 7: Safety and Security Lecturer: Dr. De-Graft Johnson Amenuveve Dei [email protected] 0243775571 Dr. De-Graft Johnson Dei 7/23/2024 Slide 1...
Lecture 7: Safety and Security Lecturer: Dr. De-Graft Johnson Amenuveve Dei [email protected] 0243775571 Dr. De-Graft Johnson Dei 7/23/2024 Slide 1 The increase use of ICT brings about some physical dangers to employees. These categorized into: – Health Aspects – Safety Aspects Dr. De-Graft Johnson Dei 7/23/2024 Slide 2 Health Aspects Health aspects has to do with how people become ill or affected by their daily contact with information systems (CBIS). The following are some health risks: – Back and neck problems/strain – Eye strain – Headaches Dr. De-Graft Johnson Dei 7/23/2024 Slide 3 Safety Aspects Safety aspects has to do with the dangers that could lead to serious injury or even loss of life. Some common examples of safety risks are as follows: – Electrocution – Trailing wires (Can make you trip) – Heavy equipment falling and causing injury – Electrical overload – Fire risk Dr. De-Graft Johnson Dei 7/23/2024 Slide 4 E-safety This refers to safety when using the internet and other means of using electronic media to communicate, such as mobile phones, intranets etc. That is keeping personal data safe when using Information Systems. E-safety also refers to the benefits, risks and responsibilities when using Information systems. Dr. De-Graft Johnson Dei 7/23/2024 Slide 5 E-safety The hazards associated with e-safety can be categorized into two types: ILLEGAL/INAPPROPRIATE CONTACT CONTENT Inappropriate Copyright issues contact with adults Plagiarism Bullying Inappropriate images Social network software Financial risk Dr. De-Graft Johnson Dei 7/23/2024 Slide 6 E-safety Issues Encountered Giving out personal information to people who are unknown to you Sending photos of ones self- either online or via a mobile phone Failing to maintain your privacy settings when using online devices Failing to verify the security of websites before visiting them Opening emails from unknown sources Emailing people you do not know Failing to be vigilant when using social network sites, instant messaging and chat rooms. Cyberbullying Dr. De-Graft Johnson Dei 7/23/2024 Slide 7 How to Manage or Prevent E-safety Issues Manage your privacy settings on social network sites. Before disclosing your personal data such as name, address, image or yourself etc., ask your self these questions: – Who is collecting the information? – Why is it necessary? – What will be done with it? – What will the consequences be for me? Install antivirus and security software and them updated. Dr. De-Graft Johnson Dei 7/23/2024 Slide 8 Discussion Activity Evaluate your own use of e-mail and social media/ networking sites. 1. Which of the following e-safety issues applies to you? 2. What e-safety strategy will you use to deal with these issues? Dr. De-Graft Johnson Dei 7/23/2024 Slide 9 Part 2 Physical Security (Security of Data) Hacking Phishing Smishing Vishing Pharming Dr. De-Graft Johnson Dei 7/23/2024 Slide 10 Security of Data This refers to the security risks/ threats associated with any electronic devise that connects to a network. The following are some examples: Hacking Phishing Malwares Smishing Vishing Pharming Dr. De-Graft Johnson Dei 7/23/2024 Slide 11 Hacking (Unauthorized Access) This is the act of gaining unauthorized access to a computer system. This can lead to identity theft or misuse of personal information. Data can be stolen, deleted, changed or corrupted on a user’s computer. Dr. De-Graft Johnson Dei 7/23/2024 Slide 12 Phishing This is normally carried out through electronic communications, such as emails. This is when an authorized person attempts to gather personal data, such as passwords and credit card details, by distinguishing themselves as a trustworthy person or organization. The email will look legitimate and will normally encourage a person to click on a link on the email and when the link is clicked, it will take the user to a website that will ask them for their personal information. Dr. De-Graft Johnson Dei 7/23/2024 Slide 13 Pharming Pharming is another method of collecting personal data. A hacker will install malicious code onto a person’s computer or server. When a user types in a web address, they will be redirected to a fraudulent, but legitimate looking, replica website, without their consent. Dr. De-Graft Johnson Dei 7/23/2024 Slide 14 Dr. De-Graft Johnson Dei 7/23/2024 Slide 15 Smishing Smishing is short for SMS phishing. It is similar to phishing, but it is carried out using SMS text messaging rather than email. Dr. De-Graft Johnson Dei 7/23/2024 Slide 16 Vishing Vishing is short for voice phishing. It is the act of using a telephone call to try and scam a user into giving their personal data. The scammer will usually pretend that they are a legitimate person or organization. Dr. De-Graft Johnson Dei 7/23/2024 Slide 17 Malwares Malware is a computer program that is designed to damage or disrupt a computer system and the files that are stored on it. Malwares can take the following forms: Viruses Adware Trojan horse Rootkit Worms Malicious bots Spyware Ransomware Dr. De-Graft Johnson Dei 7/23/2024 Slide 18 Virus This is a program code or software that can replicate itself with the intention of deleting or corrupting files on a computer. They often cause the computer to malfunction. For example by filling up the hard disk drive. Dr. De-Graft Johnson Dei 7/23/2024 Slide 19 Trojan Horse This is a malicious computer program that disguises itself as another application, such as a game or a utility program. It normally acts as a computer virus would. Dr. De-Graft Johnson Dei 7/23/2024 Slide 20 Worms This is a small computer program that uses computer networks and finds security holes to replicate itself. They can also exploit security holes in a piece of software or operating system. Worms also often acts like a virus would. Dr. De-Graft Johnson Dei 7/23/2024 Slide 21 Spyware/ Key-Logging Software This is a software that gathers data by monitoring key presses on the users keyboard; the gathered data is sent back to the person who sent the software. Dr. De-Graft Johnson Dei 7/23/2024 Slide 22 Adware Adware is short for advertising-supported software. It is a software program that is used to display adverts that are targeted at the user. It can analyze the website the user visits and will target them with advertising of a similar nature. Dr. De-Graft Johnson Dei 7/23/2024 Slide 23 Rootkit This is a computer program that enables a person to gain administrator access to a victims computer. It normally gets installed when a victims password is cracked. Dr. De-Graft Johnson Dei 7/23/2024 Slide 24 **END** Thank You Dr. De-Graft Johnson Dei 7/23/2024 Slide 25