Please enable JavaScript.
Coggle requires JavaScript to display documents.
environment issues/data protection (malware (Spreading of malware (How do…
environment issues/data protection
computer components what raw materials are they each made from?
Heat sink
Aluminium
Mouse
Plastic
Rubber
Network CPU
Fibreglass
cable
Aluminium
Copper
Gold
Plastic
RAM
Fibreglass
Gold
Hard drive
Aluminium
Steel
Fibreglass
Plastic
renewable or non-renewable?
Plastic Non-renewable
Steel Non-renewable
Gold Non-renewable
Copper Non-renewable
Aluminium Non-renewable
Fiberglass Non-renewable
Diesel Non-renewable
Water Renewable
Lifecycle of a computer
Mining for raw materials
Manufacture
Purchase and use
Recycling centre
Reprocessing plant
Environmental damage
Mining raw materials leads to contamination and erosion
Plastics damage the environment if not recycled
Gas and coal are needed to power the factories
Cooling systems use large amounts of water
diesel is needed for transportation of raw materials, parts and the final product
E-waste
In the UK
1.6 million tonnes
23% of electronics thrown away still work
we throw away:
300 tons of gold (£9 billion)
1000 tons of silver (£400 million)
16 million tons of steel (£6.5 billion)
Each mobile phone contains about 24mg of gold
Fairphone
Fairphone was launched in 2013
The modular phone is designed so that the user can replace the parts in it
his means the phone lasts longer and creates less waste
Designed for easy use and to be long lasting
Offers repair tutorials to increase how long the phone can work for
Responsibly sourced materials
Good working conditions for people who make the phone
Energy saving
Unplug external devices that are not in use
Shutdown computers when not in use
Turn off lights when not in use
Pick more energy efficient products
There are many ways to save energy on mobile devices
Turn off Wi-Fi, Bluetooth, GPS or NFC if you aren’t using them
Stop using apps that use the most battery
Reduce apps such as email and social networking from checking for messages so often
Install the latest updates
Make use of power saving mode
Energy saving policies
Businesses and other organisations can set all their computers to have the same energy saving policies
Suspending or turning off computers at the end of the day
Putting displays onto standby if they haven’t been used for an amount of time
stopping hard disks from spinning if they haven’t been used for a while
ID theft
ID theft only needs a name, address and date of birth
these details are enough for fraudsters to make fake ID and then open bank
What is data protection
Data protection is about looking after the personal data of people
The Data Protection Act (2018) is the law that covers this
In 2018, the EU General Data Protection Regulation (GDPR) was added to the UK Data Protection Act
Data collection
Organisations that collect personal data must:
Only collect the data for a specific purpose
Make sure the data is accurate
Data that is not necessary for the specific purpose may not be collected
Data can come from 3rd parties and user sign-up details
Data processing
Consent
A person has agreed to
their data being used
Contract
Processing is needed for
a contract
Legal obligation
Processing the data is
needed to meet the law
Vital interests
Processing is needed to
protect someone’s life
Public task
For performing an official
task
Legitimate interests
There is a clear benefit to the user or company
Data storage
The data is kept accurate and up to date
It is not kept any longer than necessary
It must not be transferred to other countries unless they can keep it protected
Customers must be told of a data breach within 72 hours of it happening
Data must be stored so that it is protected from unauthorised access
Cookies
ookies are sent to a user’s computer from web sites. The allow websites to:
• Store data such as the contents of your shopping basket
• Remember that you are logged into a social network
• Remember who you are
• Track you
• Target advertising to you
• Users must consent to receiving cookies
Penalties
Penalties for breaching the Data Protection Act include:
Issuing warnings to the organisation
Order the organisation to comply
For serious breaches, fines are up to:
4% of company turnover
€20 million
Shell is the largest UK company earning over £180 billion per year
Rights
The right to view data stored about you by organisations
The right to withdraw consent – this allows you to be removed from a mailing list
The right to make changes to your data if it is inaccurate
The right to be forgotten – this allows you to delete your personal data
Transactional data
Transactional data is data created when people buy or sell something
Transactional data is also produced with online shopping
Brand value
In 2018, Apple had a brand value of $146 billion
amazon had the largest brand value worldwide of $151 billion
Intellectual property
Intellectual property is something which is not physical but has value
Brands and logos
Inventions
Product design
Books, music, video
Copyright and patents
inventions are covered by patents
A patent prevents anyone else using the invention for 20 years
Copyright protects books, video and music
Copyright typically lasts 70 years after publication or an author’s death
Copyright lets an author or musician decide how their work should be used
Copyrighted materials and patents are protected by the Copyright, Designs and Patents Act (1988)
Trademarks and brands
Trademarks are names or symbols used by a company so that they cannot be used by others
If a company registers them they are a registered trademark
Brands are made up of trademarks like company logos and product names. They also include:
Advertising
• Business stationery
• Customer service
• A companies personality
Using intellectual property
If you use someone’s work and pretend it is your own, it is plagiarism
You must acknowledge who originally produced the work
This includes the author’s name and year it was produced
Use quote marks around any text copied
To make copies of images, books, music you need
Permission from the owner or author
You may need to pay for a licence to use the work
you will need to acknowledge who the author or creator was
Unauthorised access
Unauthorised access is where a person gains access to a computer system without permission
This could be a hacker who gains permission to a system they shouldn’t be using
it may also be an employee who has permission to use some of a system, but gains access to another part
Hackers try to find weaknesses in a computer system
They will often gain access with one user account and then try to alter the permissions to get root or admin access
Unauthorised modification
Deleting other user’s files
Changing the content of documents
Altering the content of web pages or databases
Rewriting computer programs to remove activation keys
malware
Malware is malicious software
Deleting files
Slowing the computer
Sending spam
Malware includes:
Viruses and worms
Botnets and rootkits
other types of malware
Malware can infect all types of computer including:
• PCs or Macs
• Portable devices such as tablets or smartphones
• Internet of Things (IoT) devices such as doorbells or video cameras
• Millions of new malware are produced as smartphone apps each year
Creation of malware
Malware is created in the same way as normal computer programs
• A hacker will write programming code which exploits weaknesses in computer systems, networks or software
• They will then use a number of methods to get users or their computers to run the code
• There are tools that allow hackers to create malware without knowing how to program
Spreading of malware
How do computer viruses and malware spread?
• A number of methods can be used
• Email attachments containing malware
• Clicking on web page links that download malicious software
• Removable media which auto-runs or the user runs the malware
• Trojans – a useful item of software which is run also contains malware
Law
The Computer Misuse Act (1990) makes it illegal to:
• Gain unauthorised access to a computer system
• Make unauthorised modifications to software or data
• Spread malware
• The Police and Justice Act (2006) makes it illegal to:
• Create malware or items that may be used in computer misuse
• Committing these crimes can result in up to 10 years in prison and a fine