Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Safety & Security

By: Miss Ilham

Physical Security

Physical Security

Health Risk

Back & Neck

Problem

Back & Neck Problem

Caused: sitting in front of the computer screen for so long periods in the same position

Prevention:

  • use fully adjustable chairs to give the correct posture
  • use foot rests to reduce posture problems
  • use screen that can be tilted to ensure the neck is at the correct angle

RSI

Repetitive Strain Injury (RSI)

Definition: Damage to fingers and wrists caused by continuous use of a keyboard or repetitive clicking on a mouse buttons

Prevention:

  • ensure correct posture of arms
  • make proper use of wrist rest
  • take regular break
  • make use of ergonomics keyboards
  • use voice-activation software to reduce the use of finger and wrist

Eyestrain & Headache

Eyestrain & Headache

Caused: staring at a computer screen too long or having incorrect lighting in the room

Prevention:

  • ensure that there is no screen flicker
  • use LCD (less flicker) than CRT
  • take regular breaks (try focusing on point that is some distance away)
  • make use of anti-glare screens
  • use windows blinds to reduce sunlight reflecting from the screen
  • have eyes tested on regular basis

Ozone

Irritation

Ozone Irritation

Caused: lasers printers in an office area which will cause dry skin and respiratory problems

Preventions:

  • proper ventilation should exist to remove the ozone gas as quickly as possible
  • laser printer should be housed in a designated printer room
  • change to other types of printer if necessary

Safety Risk

Electrocution

Electrocution

Prevention:

  • Use an RCB (Residual Current Breaker)
  • Check insulation on wires regularly
  • don't allow drinks near computers
  • check equipment on regular basis

Trip

Trailing Wires (Trip Hazard)

Prevention:

  • Use cable ducts to make the wire safe
  • cover wires or have them neatly tucked away (under desk, along the wall)
  • use wireless connection wherever possible

Falling

Heavy Equipment Falling

Prevention:

  • Use strong desk & tables to support heavy hardware
  • Use large desk & tables so that hardware isnt too close to the edge

Fire

Fire Risk

Prevention:

  • Have a fully tested CO2 fire extinguisher nearby
  • Don't cover equipment vents with fabric
  • Make sure the hardware use is fully maintained
  • Ensure good ventilation in the room
  • Don't overload socket with too many items
  • Change to low-voltage hardware wherever possible

e-Safety

e-Safety

Personal Data:

  • Contact details (Phone number/email address)
  • Address Details
  • Personal Images
  • Payment details including card and bank details
  • Medical history
  • Political views
  • Family details
  • Passwords

e-Safety

Why personal data should be confidential and protected:

  • Users can be stalked or even kidnapped – status updates can alert people of your location at a particular time.
  • Details can be stolen, copied or pass on.
  • Users could be blackmailed/ threatened into doing inappropriate things.
  • Customer details could be sold onto a third party.

e-Safety

How to avoid inappropriate disclosure of personal data:

  • Ensure privacy setting in social media sites have been activated.
  • Do not share data via social media or emails with strangers.
  • Do not post inappropriate images or content.

Personal Use of Internet

Minimise the Potential Dangers:

  • Only use trusted websites or those recommended by teachers.
  • Only use a student friendly search engine with safety filters.
  • Restrict access to certain content via ISP or filtering software.

Use of Email

Minimise the Potential Dangers:

  • Only email people already known to you or from your contacts list.
  • Think before opening an email from an unknown person.
  • Be careful about emailing your school’s name or a picture of yourself in school uniform.

Use of Social Media

Minimise the Potential Dangers:

  • Know how to block and report unwanted users in chat rooms.
  • Never give out any personal information online.
  • Never arrange to meet strangers especially in a secluded place.
  • Keep adults informed about your use of social media.

Online Gaming

Minimise the Potential Dangers:

  • Never use real name when playing games online.
  • Use appropriate language when using headsets and communicating with other gamers.
  • Only play online with trusted friends.

Security of Data

Security of Data

Hacking

What is Hacking?

  • To gain unauthorised access to a computer system without the user knowledge or permission.

Effect of Hacking

  • To delete, corrupt, copy and edit files. Sensitive Data could be sold to competitors.
  • Identity theft – to steal users identity.
  • To expose a company (for example wiki leaks).
  • To cause disruption and stop production.

Strategies to prevent hacking to protect data

  • Use of firewalls – sometimes part of the operating system.
  • Use of strong passwords which are frequently changed.
  • Use of protection software to detect and block possible hacking attempts.
  • Hire a professional hacker to test the weaknesses of your system.

Phishing

What is Phishing?

  • The recipient will receive an email which looks legitimate.
  • The email will normally request the user to update their details which could be their password or payment details.
  • To update the users details they will have to click on a link which will take them to a fake website.

Effect of Phishing

  • The user will be tricked into entering their details into a fake website.
  • The sender of the initial email will have gained personal details from the user.
  • These details can be used fraudulently or for identity theft.

Strategies to prevent Phishing

  • Use a filter on your email account so that only emails from an allowed users appear in your inbox.
  • Always double check the URL and email address.

Pharming

What is Pharming?

  • A malicious code installed onto a web server or computer will redirect users to a fake website even though they have typed in a legitimate URL address.

Effect of Pharming

  • The fake website will look like the real website (websites tend to look like a trusted websites to deceive the user).
  • Users will be tricked into entering their personal details. Like Phishing this can lead to fraud or identity theft.

Strategies to prevent Pharming

  • Anti spyware software could eliminate pharming code from a computer.
  • Always double check the URL to see if is the same one you typed in.

Spyware

&

Key-logging

What is Spyware / key-logging software ?

  • Is a software which can monitor your use of the computer (internet browsing) and monitor and log key pressed.

Effect of Spyware / key-logging software

  • Spyware software will send the data back to person who planted the spyware software on your computer.
  • This could include personal details like passwords and banking account information.
  • Spyware software could also install additional software to read cookie data and change web browsing preferences.

Strategies to prevent Spyware

  • The use of anti spyware software which is regularly updated.
  • The use of a pointing device to select characters when entering sensitive data.

Viruses

What is computer virus?

  • A computer virus is a piece of programming code/software which can install and replicate it self on to a computer system without the user’s permission.

Effects of a computer virus ?

  • Causes the computer to crash – become slower
  • Sometimes files can be deleted – leads to computer malfunction.
  • Data files can be copied by the hacker or the files could be corrupted.
  • Could stop production until the virus has been quarantined.

Strategies to prevent computer virus

  • Install antivirus software and regularly update it.
  • Do not use software or USB from unknown sources.
  • Be careful about clicking on links from untrusted websites.
  • Be careful about downloading attachments from unknown email addresses.

Spam

What is Spam Email?

  • Spam (junk) email is sent out to recipients from a mailing list.
  • The email could be part of a phishing scam or could be to promote certain products. They are basically unwanted emails.

Why Spam needs to be Prevented?

  • uses up people's time
  • generally annoys people
  • use up valuable bandwidth on the internet, slowing it down
  • can have viruses attached
  • can be a phishing scam
  • can clog up users' inboxes

How to Prevent Spam?

  • use spam filters
  • never reply to spam email
  • use disposable email
  • be wary about giving out your main email address.
  • never reveal your email address on your website.
  • try to avoid opening spam emails and clicking on links in spam messages.

Forum

  • Online forums are interactive websites where people can take part in discussion
  • allow users to post their own comments

Moderated

Moderated Forum

  • all user's comment will be check by the administrator before they are posted to the forum
  • moderators will not allow any inappropriate comments
  • users who continually to break the rules would likely get banned
  • Moderators make sure that rules are followed

Un-moderated

Un-moderated Forum

  • do not have moderators or administrators
  • allow people to post what ever they want
  • as a result:
  • offensive & inappropriate contents
  • spamming of adverts for rubbish products
  • phishing (tricking people to get their personal data)

Cookies

Cookies

  • small file or code that are stores on a user's computer

  • small lookup table containing pair of key and data (example: surname - john)

  • usually stored user preferences

Cookies Safety Concern

  • Under normal circumstances, cookies cannot transfer viruses or malware to your computer

  • However, some viruses and malware may be disguised as cookies

  • form anonymous user profile, doesn't contain personal data such as password but still carry data within websites

Additional Security

Additional Security

Firewall

Firewall

  • can be software or hardware
  • sit between user's computer and an external network.
  • filter information coming in and out

Tasks carried out by firewall:

  • to examine the traffic between user and external
  • check incoming and outgoing data meets a given set of criteria
  • block suspicious traffic and give warning
  • user can set the criteria
  • log all incoming and outgoing traffic (allow later interrogation)
  • prevent hackers

Certain cases where firewall can't prevent potential harmful traffic:

  • individuals/ internal network, using their own modems to bypass the firewall
  • employee misconduct/ carelessness
  • user on stand alone computers can choose to disable firewall

Security Protocols

Security

Protocol

  • set of rules used by the computer to communicate with each other across a network

SSL

Secure Socket Layer (SSL)

  • SSL will encrypt data when transferring it through internet
  • Only the user's computer and and the web server can make sense of what is being transmitted (decrypt)

TLS

Transport Layer Security (TLS)

  • similar to SSL, but more recent
  • provide encryption, authentication and data integrity
  • two layers:

1. Record Protocol (responsible for securing application data and verifying its integrity and origin)

2. Handshake Protocol (authenticate each other)

SSL vs. TLS

  • TLS is possible to be extended by adding new authentication method
  • TLS make use of session caching
  • TLS seperate handshake process (authentication) with the record protocol (data)

Encryption

Encryption

/ encode

encryption key

/ decipher

decryption key

Encryption

  • uses a secret key (algorithm) that has the capability of altering characters in a message
  • The message will be unreadable unless the recipients also has the same secret key

Authentication

  • used to verify that data comes from a secure & trusted source

Authentication

Digital

Certificate

Digital Certificate

  • pair of files that are stored on a user's computer
  • public key (known by anyone)
  • private key (known to the computer user only)

  • when sending email , digital certificate can be attached, and recipients can verify that it comes from trusted source by viewing it public key

Digital Certificate

  • made up of six parts:
  • sender's email address
  • name of the digital certificate owner
  • serial number
  • expiry date
  • public key (used for encrypting message & digital signature)
  • digital signature of the certificate authority

Digital Certificate

Passwords

Passwords

Biometric

  • relies on certain unique characteristics of human being

Biometrics

Fingerprint

Fingerprint Scan

Advantages

  • One of the most developed biometric techniques
  • very high accuracy
  • very easy to use
  • relatively small storage requirements

Fingerprint Scan

Disadvantages

  • For some people its still intrusive, since its still related to criminal identifications
  • it can make mistakes if skin damages (cuts)

Signature

Signature Recognition

Advantages

  • Non-intrusive
  • require very little time to verify
  • relatively low-cost technology

Signature Recognition

Disadvantages

  • Inconsistent signature
  • High error rate

Retina

Retina Scan

Advantages

  • very high accuracy
  • no known way to replicate person's retina

Retina Scan

Disadvantages

  • very intrusive
  • relatively slow to compare with stored scan
  • very expensive to install and setup

Iris

Iris Recognition

Advantages

  • very high accuracy
  • verification time is generally less than five seconds

Iris Recognition

Disadvantages

  • very intrusive
  • used a lot of memory for the data to be stored
  • very expensive to install and setup

Face

Face Recognition

Advantages

  • non-intrusive method
  • relatively inexpensive technology

Voice

Voice Recognition

Advantages

  • non-intrusive
  • verification take less than five seconds
  • relatively inexpensive technology

Voice Recognition

Disadvantages

  • voice can be recorded easily and used for unauthorised access
  • low accuracy
  • an illness (flue & coughing) can change a person's voice

Comparison

Comparison

Comparison

Learn more about creating dynamic, engaging presentations with Prezi