Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 8: Safety & Security - Coggle Diagram
Chapter 8: Safety & Security
Chapter 8: Physical Safety
Health aspects
HEALTH RISKS
Back and Neck problems/strain
fully adjustable chairs
foot rests
tilted screens
Repetitive strain injury
correct posture
wrist rest
regular breaks
ergonomic keyboards
voice-activated softwares
Eye strain
no screen flickering
LCD screens
regular breks
anti-glare screens
eyes tests regularly
Headaches
anti-glare screens
regular breaks
regular eye tests
Ozone irratation
proper ventilation
laser printers should be in designated room
change printers
Safety Aspects
SAFETY RISKS
⚡️
use RCB
check insulation
no drinks
check equipments
Trailing wires
use cable ducts
cover wires
use wireless connections
Heavy equipment falling and causing injury
strong & large desks/tables
🔥
fully tested dry fire extinguisher
no equipment vent's covers
ensure good ventilation
no overload sockets
regular checks
check state of wires/cables
no drinks allowed
fix wires
no computer covers
E-safety
safety when using the internet
Security of data
Hacking
act of gaining unauthorized access to a computer access
lead to identity theft & data can be deleted or corrupted
Preventions
Use firewalls
strong passwords
intrusion detection software
Phishing
fake emails to target users
gain personal data, identity theft
Preventions
ISPs filter out phishing emails
be cautious
don't click on executable attachments
Pharming
code installed on user's computer, redirect the user to a fake website
gain personal data, identity theft
Preventions
anti=spyware websites
be alert and look out for clues
Spyware & key-logging software
gathers data by monitoring key presses
access data, instal spyware
Preventions
Viruses
code or software that can replicate itself to corrupt files
corrupt operating system files
anti virus software and trusted developer
Spam
junk mail
denial of services
obtain maximum protection
un/moderated forums
online discussion forum checked by admin before it posted
cookies
small file of text, store data
Additional security of data online
firewall
filters information in and out of computer
tasks
log all incoming out outgoing traffic
prevent viruses or hackers
Security protocols
step of rules used by computers to communicate
two forms
SSL
TLS
encryption
plain text to cipher text
authentication
digital certificates
public key
private key
Passwords
protect online data with combination of letters and numbers
Biometrics
adv
unique, therefore more security
can't be misplaced
disadvantages
expensive
infringement of civil liberties
Online credit fraud
get accessed by using spyware
giving away details without knowing
preventions:
use varied and complex passwords
only trusted websites
Cloud security
Advantages
no carrying memory sticks
cloud is controlled by external companies
Disadvantages
data security
data loss