Online safety flashcards

Description

revision for online safety
Mollie Wadsworth
Flashcards by Mollie Wadsworth, updated more than 1 year ago
Mollie Wadsworth
Created by Mollie Wadsworth about 7 years ago
50
0

Resource summary

Question Answer
What Are Privacy Settings? Privacy settings are controls available on many social networking and other websites that allow users to limit who can access your profile and what information visitors can see.
How are privacy settings altered? You should be able to go to the 'about' section of your profile, click on the small cog (usually in the corner) and press 'privacy settings'.
How important is keeping sensitive information to yourself? Very important - if others found out about information you didn't want anyone else to know, you would feel bad and others could even bully you about it!
What id cyber-bullying? Cyber-bullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
How does cyber-bullying affect others? People experience anxiety, fear, depression and low self-esteem. Some people also feel suicidal.
What id copyright? It is the right to make copying things, such as music, art, titles and documents, illegal.
What are the consequences of copyright? The person who illegally copied the work will get fined from £200 to £150,000 and all the fees and court costs.
How important is copyright? Copyright legally protects an person's works — and, therefore, is vitally important to people who want to create their own things.
What is hacking? Computer hacking is modifying or altering computer software or illegally accessing a computer system.
What is malware? Malware is software which is specifically designed to disrupt, damage, or gain access to a computer system.
How do you protect yourself from malware and hacking? Use a firewall or an anti-virus software. These are two types of protection for your computer.
What is phishing? Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of “fishing” for passwords and other secret financial info.
How can you protect yourself from phishing? Don't click on any links in emails and never give out any personal or sensitive information to people your don't know.
What issues are related to the use of information? People could use your information for bad things.
Explain the issues related to the use of information. Fraud-misuse of personal data and bank details etc... Bullying-posting inappropriate pictures or mean messages. Blackmail-using private information against you.
How does the use of information affect an organisation? The use of private information can affect individuals and organisations by a lack of security and data protection.e.g stealing company or individual info to sell.
Show full summary Hide full summary

Similar

Computing
Ben Leader
Databases
Dean Whittle
Devices That Create Tension.
SamRowley
Religious Studies- Marriage and the family
Emma Samieh-Tucker
How to revise
KimberleyC
The Periodic Table
Catherine Kidd
physics gcse key terms
lmarine
Primary School Mathematics
lara.greenberg
NSI Test First day
Adedipe Odunayom
Othello Quotes
georgia2201
An Inspector Calls (Key Quotes)
Samira Choudhury