Beruflich Dokumente
Kultur Dokumente
Make sure your data and privacy is protected from hackers and scammers. Someone could pretend to be you and do
illegal activity.
Discuss the to secure your computer. Briefly explain each of them and what you need to do.
: What you need to do: Stop and think before you provide any photos or financial or personal
information about yourself, your friends or your family
: What you need to do: Use strong, hard-to-guess passphrases and/or two-factor authentication
where available to access your accounts
: What you need to do: when you receive an email, consider who is emailing you and what they are
asking you to do. Call the business a suspect message claims to be from using contact details obtained from
a website or other legitimate source.
: What you need to do: Minimise visits to unknown websites and avoid being enticed by the
promise of sensational content through ‘clickbait’
: What you need to do: Access your bank’s website by typing the address directly into your
browser. (ii) Keep your computer up-to-date with anti-virus, anti-spyware and firewall software. (iii) Use the
security measures (such as two-factor authentication) recommended by your bank. (iv) Always log out of the
internet banking menu and closing your browser when you have completed a session. (v) Research for
unknown retailers and their products and services. (vi) Deal primarily with trusted and reliable online
retailers.
: What you need to do: ) Install reputable security software. (iv) Read the user manual. (v) Use the
most up-to-date operating systems
: What you need to do: Regularly update applications (including anti-virus software and plugins)
and operating systems to fix these vulnerabilities. Most vendors make automatic updates available.
: What you need to do: (ii) Back up your data regularly and retain the backup in a safe location,
preferably protected or isolated from the device the data is being backed up from.
e) What is ?
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer
system.
software that enables a user to obtain covert information about another's computer activities
by transmitting data covertly from their hard drive.
b) What is the difference between by the terms & ?
A hoax email is when your faking to steal someone information or try to get money out of them like a scam.
Spam is just random things telling you stuff trying to scam you.
Try the cyber-safety Game: GRAPPLE
http://www.side.wa.edu.au/static/grapple
How well did you complete the games/activities and what have you learnt from the site? Explain.