Docstoc

activity 1.2 miss harper carina dos santos - cds28

Document Sample
activity 1.2 miss harper carina dos santos - cds28 Powered By Docstoc
					ACTIVITY 1.2
MISS HARPER
CARINA DOS SANTOS




   Carina Dos Santos
                         Social Impacts of IT
•   There are Advantages and disadvantages associated with the social impacts of IT in
    today's society.
•   Some advantages are stated below
•   We now live an, easier, faster, more efficient life, and we can do more interesting jobs
    due to IT.
·
•   New jobs are being created by the introduction of IT e.g. programming, network
•   Managing etc.
•   You can communicate and socialise immediately, cheaper and more efficient.
•   We can acknowledge worldwide news instantly, rather than waiting days to know
    about news, we can instantly find it.

•   Disadvantages
•   The new jobs being created by the use of IT are only for highly skilled and qualified
•   People.
•   The people who did the dull repetitive jobs which are now done by computers no
    longer have a Job.
    The storage of personal data held on computer has eroded.
•   Privacy-From cell phone signal interceptions to e-mail hacking, people are now
    worried about their private information becoming public knowledge.
                                  Carina Dos Santos
                                       Potential threats in IT
•   Cyber bullying: This is a threat in IT and it is not only impacting just youngsters, but however also adults,
    due to the exploding popularity of social networks. There are several forms of cyber bullying such as the
    following:
-Email, Instant messenger and chartrooms, social networking sites, ,mobile phone, interactive gaming, sending
    viruses
, and abusing personal information.


    - Spam is also another threat associated with IT as its one of the biggest nuisance of IT in today's society. It
     has become increasingly easy to become a target of such unsolicited mail. There are two main types of spam,
     cancellable Usenet spam and Usenet spam. you could get spam due to the below:
-Post to a newsgroup
-Sign up for an internet service that asks for an email address
-Give out your email address on your own website
-Give your address to an online retailer



•   Phishing is also another aspect of Threats in IT. The word defines an email fraud scam method in order to
    induce individuals to reveal personal information such as
•   -usernames
•   -passwords
•   -credit card details.
•   In addition to stealing personal and financial data, phishers can infect computers with viruses and convince
    people to participate unwittingly in money laundering.
                                                Carina Dos Santos
                                     Potential threats in IT
Viruses can be open by opening an unusual email or going on a fake websites which can give your
computer or laptop a virus. Below states some ways to avoid a virus:
-Download an anti-virus scanner.
-Scan your system regularly.
-Don't open any mysterious attachments.
-Don't download any file with an .exc file extension, unless it is from a reliable source. (Most of these
avoiding tips apply for the threats mentioned below.)

Computer hacking is when someone edits computer hardware or software in a way that changes the
creator's original intent. A hacker can also run a type of program on your computer that can get the
information they want.

Worms submit a threat even when computer users do not download any files. These programs tend to use
the internet in order to search for vulnerable computers. Once they locate them, they move in. The majority
of computer users might not recognize that anything has happened until they begin to experience computer
problems.

Identity theft - This type of threat is becoming most common. Identity theft is when one person pretends to
be another person in order to steal money or benefit themselves in some way. Some types of identity
thieves hack into databases to steal personal information, however there are There are two main types of
identity theft – account takeover and true name theft.

Theft of Data – Data is really important in every business. Theft of data is when information is illegally
copied or taken from an individual or business, the usual information targeted is passwords, social security
numbers, credit card information, other personal information.

                                           Carina Dos Santos
Specialist channel (Podcast)




           Carina Dos Santos
Filled in required information




           Carina Dos Santos
Registration successful




        Carina Dos Santos
Login successful




     Carina Dos Santos
Uploading onto podcast




        Carina Dos Santos
Upload complete and published.




            Carina Dos Santos
Carina Dos Santos
Information Presented




       Carina Dos Santos
Information Presented




       Carina Dos Santos
Information Presented




       Carina Dos Santos
Information Presented




       Carina Dos Santos
Information Presented




       Carina Dos Santos
Carina Dos Santos
                            Podcast
•   The communication channel Podcast is convenient, automatic and offers a
    powerful way to share information, it is also an easy way to reach my
    focused subject of IT. I think it was a good communication channel to
    portray and communicate the information about IT and how people should
    stay safe and secure whilst using the internet. The document can also be
    accessed at anytime from people who perhaps have an interest in the
    chosen subject and be viewed at anytime and anywhere, by anyone as
    podcast is so accessible. The great thing about podcast aslo is you can
    publish your podcast as often as you want (i.e. once a week, every day,
    once a month) and because podcast is delivered over the internet, it's a
    very inexpensive means of communication which is why I used it for the
    training programme. Podcast also enables people to use the information
    perhaps as a flat form, for other tasks, and can even be shared on Google
    to share ideas from or suggest ways in solving some of the issues the
    arising in the document and make alterations if wanted.



                              Carina Dos Santos
                                            How to stay safe and secure (D1)
The internet comes with its advantages and disadvantages. So educate yourself and be smart about where you visit and click on. There are many
      negatives associated with IT, below is just a brief summary on how to avoid these negatives and ensure safety whilst using Podcast.

•    -Use a firewall, without firewall your computer is open to being hacked. Varies times hackers discover new security holes in software and therefore people
     get hacked before a security patch is released, with firewall most these security holes will not be accessible as the firewall will block attempts and help
     ensure you are safe and secure whilst using Podcast.

•    -Use Encryption-converting information through the use of a code which prevents it being identified and understood by people unauthorised to read it.
     Emails, files, and so on can be encrypt, the stronger the encryption the harder its for a hacker to decrypt the code.

•    -Phising- phising is a term used for emails and websites that attempt inducing personal information out of users.
•    Example: A bank email informing you unusual activities have taken place and if you click on the link provided by them and type in bank details, the
     problem will be solved. Be aware, and never give out personal details such as, pins, passwords, usernames whilst using Podcast.

•    -Choose strong passwords when creating Podcast, create passwords using a combination of uppercase and lowercase letters, numbers and special
     characters like $, @, !, etc. Avoid using passwords that may be easily guessed, like birthdays, anniversaries or names of your children or pets.

•     Below suggests a few other ways to stay safe and secure, however not just on Podcast but during the use of IT.
•    Scan for viruses-Sometimes, typically via email or other means, viruses are able to cross the firewall and locate themselves on your computer anyway. A
     virus scanner will locate and remove them from your hard disk.

•    -Social Networking- social networking has become increasingly popular, however there is potential for failure of security in both personal and business
     context wise. Other negatives linked to social networking are, cyber stalking, online scams, identity theft also, so be very cautious and do not accept
     requests from unknown people. Do not post private information, including your cell phone number, home address, class schedule, social plans, etc. And
     finally utilize the "Privacy" settings on your Facebook account, you can adjust your privacy settings to control who has access to your personal information.

•    -Install software, browser and OS updates regularly.

     -Do not open attachments from unknown users, look out for these especially: .exe, pif. Bat


     -Security tools- enabling tools such as 2 step verification and others will add layers of security to your   account.

                                                                    Carina Dos Santos

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:0
posted:4/12/2013
language:English
pages:19