Online safety flashcards

Descripción

revision for online safety
Mollie Wadsworth
Fichas por Mollie Wadsworth, actualizado hace más de 1 año
Mollie Wadsworth
Creado por Mollie Wadsworth hace alrededor de 7 años
50
0

Resumen del Recurso

Pregunta Respuesta
What Are Privacy Settings? Privacy settings are controls available on many social networking and other websites that allow users to limit who can access your profile and what information visitors can see.
How are privacy settings altered? You should be able to go to the 'about' section of your profile, click on the small cog (usually in the corner) and press 'privacy settings'.
How important is keeping sensitive information to yourself? Very important - if others found out about information you didn't want anyone else to know, you would feel bad and others could even bully you about it!
What id cyber-bullying? Cyber-bullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
How does cyber-bullying affect others? People experience anxiety, fear, depression and low self-esteem. Some people also feel suicidal.
What id copyright? It is the right to make copying things, such as music, art, titles and documents, illegal.
What are the consequences of copyright? The person who illegally copied the work will get fined from £200 to £150,000 and all the fees and court costs.
How important is copyright? Copyright legally protects an person's works — and, therefore, is vitally important to people who want to create their own things.
What is hacking? Computer hacking is modifying or altering computer software or illegally accessing a computer system.
What is malware? Malware is software which is specifically designed to disrupt, damage, or gain access to a computer system.
How do you protect yourself from malware and hacking? Use a firewall or an anti-virus software. These are two types of protection for your computer.
What is phishing? Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of “fishing” for passwords and other secret financial info.
How can you protect yourself from phishing? Don't click on any links in emails and never give out any personal or sensitive information to people your don't know.
What issues are related to the use of information? People could use your information for bad things.
Explain the issues related to the use of information. Fraud-misuse of personal data and bank details etc... Bullying-posting inappropriate pictures or mean messages. Blackmail-using private information against you.
How does the use of information affect an organisation? The use of private information can affect individuals and organisations by a lack of security and data protection.e.g stealing company or individual info to sell.
Mostrar resumen completo Ocultar resumen completo

Similar

Preguntas Módulo de Promoción de la Salud y Prevención de la Enfermedad
D. Valenzuela
CCNN 5EP. Tema 6. Aparato locomotor
JOSÉ ALBERTO VERDUGO GARCÍA
Separaciones Centrìfugas
nimbe rincon
PRESENT CONTINUOS
fapn
Ley Orgánica de la Administración Pública Federal.
Miguel Guizar
EVENTOS EN JAVA
**CR 7**
Metodos de separacion de mezclas
elkin parada
Lexicología Jurídica
Alfonso Tester
REPASO CORTO EXAMEN II EDUCACION AMBIENTAL
MIGUEL FORTIN NOLASCO
Preguntas abiertas La Segunda República
Salustiano Gutiérrez Baena