Operating Online

sinjinibasu.sb
Mind Map by , created over 6 years ago

ICT Mind Map on Operating Online, created by sinjinibasu.sb on 05/27/2013.

39
1
0
Tags
sinjinibasu.sb
Created by sinjinibasu.sb over 6 years ago
ICT Revision 2014
11RaceyG
ICT GCSE flashcards
Catherine Archer
Input and Output Devices
Jess Peason
Economics
Emily Fenton
LOGARITHMS
pelumi opabisi
MICROSOFT WORD 2013 SKILLS FOR WORK
John O'Driscoll
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
GCSE ICT Revision
Andrea Leyden
OCR gcse computer science
Jodie Awthinre
Operating Online
1 The Internet
1.1 Communicating on the Internet
1.1.1 Email
1.1.2 Online Albums
1.1.3 VoIP
1.1.4 Instant Messaging
1.1.5 Blogs/ Social Networking
1.2 Need to set up with an Internet Service Provider (ISP)
1.2.1 Cost
1.2.2 Bandwidth
1.2.3 Download Limits
1.2.4 Email and web space
1.2.5 Security
1.2.6 Reliability and support
1.3 Business on the Internet
1.3.1 Email/ IM/ VoIP
1.3.1.1 Aid collaborations
1.3.1.2 Possibility of over-reliance or misuse
1.3.2 Cloud computing
1.3.2.1 Don't need to buy multiple software license
1.3.2.2 Possible security issures with data stored third party
1.3.3 Video Conferencing
1.3.3.1 Reduces need for travel so lowers costs
1.3.3.2 People don't communicate as well as face to face
1.4 Learning on the Internet
1.4.1 Virtual Learning Environment (VLE)
1.4.2 News Websites
1.4.3 Email, instant messaging, VoIP
1.4.4 User-generated websites
2 Security Measures
2.1 Security Questions
2.1.1 Challenge-response test
2.1.2 Capcha Test
2.1.2.1 Check that the form is not being completed automatically
2.1.2.2 Capchas are used to protect systems vulnerable to email spams
3 Personal Spaces
3.1 Rules
3.1.1 Don't post anything you don't want to make public
3.1.2 Minimise details that identify you or wherabouts
3.1.3 Keep account details private
3.1.4 Only add people you know
3.1.5 Don't use apps that use GPS functions to share location with people you dont know
4 Information Misuse
4.1 Spyware
4.1.1 Trojans record all of keystrokes or take pictures of screen
4.1.2 Find out personal or financial information to commit fraud
4.1.3 Firewalls prevent spyware being remotely downloaded
4.1.4 Install antispyware protection software
4.1.5 Be wary of downloading files
4.2 Identity theft
4.3 Phishing
4.4 Cookies
4.4.1 Small text files
4.4.2 Stored on computer and track what is done on the website
5 Legislation
5.1 The Data Protection Act 1998
5.1.1 Keep information secure
5.1.2 Not to keep data longer than necessary
5.1.3 Data accurate and up to date
5.1.4 Not to use data without consent
5.1.5 Not ask for more info than necessary
5.2 Data protection rights
5.2.1 Check any personal data an organisation holds
5.2.2 Incorrect information is amended
5.2.3 Data should not be used in a way to harm you
5.2.4 Info not used for direct marketing
5.3 Computer Misuse Act
5.3.1 Remotely log into a network or computer with intent to steal or corrupt data
5.4 Copyright, Designs and Patents Act
5.4.1 Protects people's original work from being used without permission
5.4.2 All original work is copyright and the person creating a work owns the copyright
5.4.3 Can use 'Creative Commons licences' to allow certain uses of their work
5.4.4 Cosequences
5.4.4.1 Proscuted
5.4.4.2 ISP may prevent you from using the internet
5.4.4.3 Prison

Media attachments