Threats when on the Internet

Descripción

A mindmap, ideal for revision, stating how to keep safe when online.
Rachel Haskell
Mapa Mental por Rachel Haskell, actualizado hace más de 1 año
Rachel Haskell
Creado por Rachel Haskell hace más de 10 años
29
0

Resumen del Recurso

Threats when on the Internet
  1. Computer Crimes
    1. Steal money
      1. Steal data/personal information
        1. Cause havoc for fun
          1. Illegally copying music and other paid files for free
          2. Viruses
            1. Software programme designed to copy itself over and over
              1. The first one was made in the 1980's
                1. Ways of spreading
                  1. Email attachments
                    1. downloading files from a webpage
                    2. Ways of getting rid of them
                      1. Installing anti-virus software
                        1. McAfee
                          1. Norton
                            1. Sophos
                          2. Coding
                            1. Attacks files on computer
                            2. Cookies
                              1. Text file
                                1. Conatins two pieces of information - a unique ID and a site name
                                  1. Not often a threat
                                    1. Only a threat when using a shared computer
                                    2. How to protect from threats
                                      1. Purchase anti-vitus and firewall protection
                                        1. Don't give out any personal details
                                          1. Don't use the same password for all websites
                                            1. Change your password every couple of months
                                              1. Use a strong password consisting of 7 or more characters, which includes numbers, UPPER and lower case letters and symbols
                                                1. If on a shared computer, log out of all accounts after use.
                                                Mostrar resumen completo Ocultar resumen completo

                                                Similar

                                                Types and Components of Computer Systems
                                                Jess Peason
                                                Input Devices
                                                Jess Peason
                                                Output Devices
                                                Jess Peason
                                                Networks
                                                Will8324
                                                General ICT Quiz
                                                leahshaw
                                                ICT Revison Flash Cards
                                                Arun Johal
                                                FLAT FILE VS RELATIONAL DATABASE
                                                rosiejones
                                                Online World - Learning Aim A
                                                andysedge
                                                Business Aims and ICT Strategies
                                                scrt
                                                User Interfaces
                                                Skeletor
                                                General ICT Quiz
                                                Jade Fantom