Operating Online

?
  • Created by: Amy
  • Created on: 27-05-13 14:58

Internet

Huge network -> links networks of computers. All use same protocols (TCP/IP) to communicate

WWW uses HTTP protocol to allow access to users

To connect to the internet you need a network interface card (NIC) to get cable or Wi-Fi. You also need to sign up with Internet servicce provider (ISP)

Selecting ISP

  • Cost - monthly fee and set up cost
  • Bandwidth - Higher is a higher fee. Highest never reached because of network traffic
  • Download limits - Charge extra if you go over the limit
  • Email and web space -  you are given an email address and internet space for you to create a website
  • Security - Broadband connections are vulnerable to hackers, ISP should come with a firewall and anti-virus
  • Reliability and support - may not give actual bandwidth, poor customer care, look at reviews
1 of 8

Network Use

  • Communicating
    • Email, Instant messaging, Blogs, Online Albums, VoIP (Skype), Social networking
  • Business
    • Email, Instant messaging, VoIP = communications
    • Cloud computing = storing software and can be accessed anywhere
    • Video conferencing = two way video and audio transmissions
  • Learning
    • News websites, VLE, User-geneated websites (WIKIs), Email/instant messaging/VoIP

Privacy - settings to choose who sees what information

2 of 8

Security Measures

  • Usernames&passwords - used to prove your identity
  • Security Questions
    • Best Friend
    • First School
    • NOT MOTHERS MAIDEN NAME - must be a personal answer that someone cant find out
  • Captcha Test - asked to enter numbers and letters. Proves you are human not a 'bot' as they cannot read displayed letters
3 of 8

Personal Spaces

  • Online Photo Albums
  • forums
  • blogs
  • social networking sites
  • personal page on VLE/work social media platforms
  • personal websites

Personalise your space: photos, personal information, text and web links, news feed, likes and dislikes

Control who has access: make certain things private, dont add everyone who sends a friend request, check privacy settings and think before you share

Dont say where you are as that shows you are not at home

Dont tell anyone your password

Dont use the GPS function

4 of 8

Information Misuse

Companies will keep your data secure and will only keep it as long as they need it. You can opt in not opt out

Check the site is secure before you enter financial information. HTTPS and a padlock

Spyware - Hackers install softwares called Trojan horses -> record key strokes, take photos of screen, record any financial information you enter to commit fraud

Identity theft - open bank accounts and apply for loans, credit cards in someone elses name

Valuable Information - Organisations make money by selling personal information

5 of 8

Preventing Misuse

  • Controlling Cookies
    • Track browsing activity
    • New browsers allow you to reject cookies and prompt them everytime a cookie is offered
    • You can delete them
    • Any website that collects your information should have a privacy policy
  • Phishing
    • Emails that are sent to get information from people
    • Urgent tone to make you enter information without thinking
    • Banks never email you for details
    • Look for impersonal greeting, threat, not bank website, request personal information
  • Preventing Spyware
    • Firewall
    • Antispyware software
    • be wary of downloading free things
    • Only download from trusted sites, privacy statements and dont click okay to close a window
6 of 8

Legislation - Data Protection

Data Protection Act 1998 to make sure companies:

  • Keep information secure
  • Dont ask for more data than required
  • Not keep data longer than necessary
  • Keep data up to date
  • Do not use information for other uses without consent

Our rights

  • Able to look at any information that they have about us
  • Demand incorrect information is amended
  • Not used for anything you dont want it to
  • Not used for direct marketing

For unauthorised access to computer material, unauthorised modification of computer material and unauthorised access to a computer with intent

7 of 8

Copyright

Protects peoples personal work from being used without their permission

All original work is copyright

Owners can use creative commons licenses to allow certain uses of their work

Original work: literature, music, art, images, software, drama, sound recordings, films

People spend a lot of time recording or making products so they should be paid for them or they wont be able to afford to make more

Consequences of illegal sharing = prosecution, preventing of internet use, imprisonment, huge impact on music and film industries

Examples of copyright = sharing videos and music, copying and distributing, pretending it is your work

8 of 8

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »