19
Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

  • View
    220

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

ACTIVITY 1.2

MISS HARPER

CARINA DOS SANTOS

Page 2: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Social Impacts of IT• There are Advantages and disadvantages associated with the social impacts of IT in today's

society. • Some advantages are stated below• We now live an, easier, faster, more efficient life, and we can do more interesting jobs due to

IT.• New jobs are being created by the introduction of IT e.g. programming, network• Managing etc.• You can communicate and socialise immediately, cheaper and more efficient. • We can acknowledge worldwide news instantly, rather than waiting days to know about news,

we can instantly find it.

• Disadvantages • The new jobs being created by the use of IT are only for highly skilled and qualified• People.• The people who did the dull repetitive jobs which are now done by computers no longer have

a Job.

The storage of personal data held on computer has eroded.• Privacy-From cell phone signal interceptions to e-mail hacking, people are now worried about

their private information becoming public knowledge.

·

Page 3: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Potential threats in IT

• Cyber bullying: This is a threat in IT and it is not only impacting just youngsters, but however also adults, due to the exploding popularity of social networks. There are several forms of cyber bullying such as the following:

-Email, Instant messenger and chartrooms, social networking sites, ,mobile phone, interactive gaming, sending viruses

, and abusing personal information.

- Spam is also another threat associated with IT as its one of the biggest nuisance of IT in today's society. It has become increasingly easy to become a target of such unsolicited mail. There are two main types of spam, cancellable Usenet spam and Usenet spam. you could get spam due to the below:

-Post to a newsgroup

-Sign up for an internet service that asks for an email address

-Give out your email address on your own website

-Give your address to an online retailer

• Phishing is also another aspect of Threats in IT. The word defines an email fraud scam method in order to induce individuals to reveal personal information such as

• -usernames

• -passwords

• -credit card details.

• In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering.

Page 4: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Potential threats in ITViruses can be open by opening an unusual email or going on a fake websites which can give your computer or laptop a virus. Below states some ways to avoid a virus:-Download an anti-virus scanner.-Scan your system regularly. -Don't open any mysterious attachments.-Don't download any file with an .exc file extension, unless it is from a reliable source. (Most of these avoiding tips apply for the threats mentioned below.)

Computer hacking is when someone edits computer hardware or software in a way that changes the creator's original intent. A hacker can also run a type of program on your computer that can get the information they want.

Worms submit a threat even when computer users do not download any files. These programs tend to use the internet in order to search for vulnerable computers. Once they locate them, they move in. The majority of computer users might not recognize that anything has happened until they begin to experience computer problems.

Identity theft -  This type of threat is becoming most common. Identity theft is when one person pretends to be another person in order to steal money or benefit themselves in some way. Some types of identity

thieves hack into databases to steal personal information, however there are There are two main types of

identity theft – account takeover and true name theft.

Theft of Data – Data is really important in every business. Theft of data is when information is illegally copied or taken from an individual or business, the usual information targeted is passwords, social security numbers, credit card information, other personal information.

Page 5: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Specialist channel (Podcast)

Page 6: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Filled in required information

Page 7: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Registration successful

Page 8: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Login successful

Page 9: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Uploading onto podcast

Page 10: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Upload complete and published.

Page 11: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Page 12: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Information Presented

Page 13: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Information Presented

Page 14: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Information Presented

Page 15: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Information Presented

Page 16: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Information Presented

Page 17: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Page 18: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

Podcast• The communication channel Podcast is convenient, automatic and offers a

powerful way to share information, it is also an easy way to reach my focused subject of IT. I think it was a good communication channel to portray and communicate the information about IT and how people should stay safe and secure whilst using the internet. The document can also be accessed at anytime from people who perhaps have an interest in the chosen subject and be viewed at anytime and anywhere, by anyone as podcast is so accessible. The great thing about podcast aslo is you can publish your podcast as often as you want (i.e. once a week, every day, once a month) and because podcast is delivered over the internet, it's a very inexpensive means of communication which is why I used it for the training programme. Podcast also enables people to use the information perhaps as a flat form, for other tasks, and can even be shared on Google to share ideas from or suggest ways in solving some of the issues the arising in the document and make alterations if wanted.

Page 19: Carina Dos Santos ACTIVITY 1.2 MISS HARPER CARINA DOS SANTOS

Carina Dos Santos

How to stay safe and secure (D1)

The internet comes with its advantages and disadvantages. So educate yourself and be smart about where you visit and click on. There are many negatives associated with IT, below is just a brief summary on how to avoid these negatives and ensure safety whilst using Podcast.

• -Use a firewall, without firewall your computer is open to being hacked. Varies times hackers discover new security holes in software and therefore people get hacked before a security patch is released, with firewall most these security holes will not be accessible as the firewall will block attempts and help ensure you are safe and secure whilst using Podcast.

• -Use Encryption-converting information through the use of a code which prevents it being identified and understood by people unauthorised to read it. Emails, files, and so on can be encrypt, the stronger the encryption the harder its for a hacker to decrypt the code.

• -Phising- phising is a term used for emails and websites that attempt inducing personal information out of users.• Example: A bank email informing you unusual activities have taken place and if you click on the link provided by them and type in bank details, the

problem will be solved. Be aware, and never give out personal details such as, pins, passwords, usernames whilst using Podcast.

• -Choose strong passwords when creating Podcast, create passwords using a combination of uppercase and lowercase letters, numbers and special characters like $, @, !, etc. Avoid using passwords that may be easily guessed, like birthdays, anniversaries or names of your children or pets.

• Below suggests a few other ways to stay safe and secure, however not just on Podcast but during the use of IT.• Scan for viruses-Sometimes, typically via email or other means, viruses are able to cross the firewall and locate themselves on your computer anyway. A

virus scanner will locate and remove them from your hard disk.

• -Social Networking- social networking has become increasingly popular, however there is potential for failure of security in both personal and business context wise. Other negatives linked to social networking are, cyber stalking, online scams, identity theft also, so be very cautious and do not accept requests from unknown people. Do not post private information, including your cell phone number, home address, class schedule, social plans, etc. And finally utilize the "Privacy" settings on your Facebook account, you can adjust your privacy settings to control who has access to your personal information.

• -Install software, browser and OS updates regularly.

-Do not open attachments from unknown users, look out for these especially: .exe, pif. Bat

-Security tools- enabling tools such as 2 step verification and others will add layers of security to your account.