Threats when on the Internet

Beschreibung

A mindmap, ideal for revision, stating how to keep safe when online.
Rachel Haskell
Mindmap von Rachel Haskell, aktualisiert more than 1 year ago
Rachel Haskell
Erstellt von Rachel Haskell vor fast 11 Jahre
29
0

Zusammenfassung der Ressource

Threats when on the Internet
  1. Computer Crimes
    1. Steal money
      1. Steal data/personal information
        1. Cause havoc for fun
          1. Illegally copying music and other paid files for free
          2. Viruses
            1. Software programme designed to copy itself over and over
              1. The first one was made in the 1980's
                1. Ways of spreading
                  1. Email attachments
                    1. downloading files from a webpage
                    2. Ways of getting rid of them
                      1. Installing anti-virus software
                        1. McAfee
                          1. Norton
                            1. Sophos
                          2. Coding
                            1. Attacks files on computer
                            2. Cookies
                              1. Text file
                                1. Conatins two pieces of information - a unique ID and a site name
                                  1. Not often a threat
                                    1. Only a threat when using a shared computer
                                    2. How to protect from threats
                                      1. Purchase anti-vitus and firewall protection
                                        1. Don't give out any personal details
                                          1. Don't use the same password for all websites
                                            1. Change your password every couple of months
                                              1. Use a strong password consisting of 7 or more characters, which includes numbers, UPPER and lower case letters and symbols
                                                1. If on a shared computer, log out of all accounts after use.
                                                Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                ähnlicher Inhalt

                                                Types and Components of Computer Systems
                                                Jess Peason
                                                Input Devices
                                                Jess Peason
                                                Output Devices
                                                Jess Peason
                                                Networks
                                                Will8324
                                                General ICT Quiz
                                                leahshaw
                                                ICT Revison Flash Cards
                                                Arun Johal
                                                FLAT FILE VS RELATIONAL DATABASE
                                                rosiejones
                                                Online World - Learning Aim A
                                                andysedge
                                                Business Aims and ICT Strategies
                                                scrt
                                                User Interfaces
                                                Skeletor
                                                General ICT Quiz
                                                Jade Fantom