8 Safety and security 

Candidates should be able to: 

8.1 physical safety 

describe common physical safety issues and what causes them, e.g. electrocution from spilling drinks, fire from sockets being overloaded or equipment overheating, tripping over trailing cables 

describe some simple strategies for preventing these issues 

evaluate own use of IT equipment and develop strategies to minimise the potential safety risks 

8.2 e-safety 

explain what is meant by personal data 

explain why personal data should be confidential and protected 

explain how to avoid inappropriate disclosure of personal data including: own name, address, school name, a picture in school uniform 

discuss why e-safety is needed 

evaluate own use of the internet and use strategies to minimise the potential dangers, e.g. only using websites recommended by teachers, only using a learner-friendly search engine 

evaluate own use of email and use strategies to minimise the potential dangers, including only emailing people already known, thinking before opening an email from an unknown person, never emailing the school’s name or a picture of a learner in school uniform 

evaluate own use of social media/networking sites, instant messaging and internet chat rooms and use strategies to minimise the potential dangers, including: knowing how to block and report unwanted users, never arranging to meet anyone alone, and always telling an adult first and meeting in a public place, avoiding the misuse of images, using appropriate language, respecting confidentiality 

describe measures which should be taken when playing games on the internet (including not using real names)

8.3 security of data 

effective security of data – define the term hacking and describe its effects – explain what is meant by the term hacking and the measures that must be taken in order to protect data – explain what is meant by the terms user id and password stating their purpose and how they are used to increase the security of data – explain what is meant by the term biometric data and why biometric data is used 

security of data online – explain what is meant by the term digital certificate and its purpose – explain what is meant by the term Secure Socket Layer (SSL) – describe the features of a web page that identify it as using a secure server – define the terms: phishing, pharming, smishing – describe the methods which can be used to help prevent phishing, pharming and smishing – describe the potential for the malicious use of technology to collect personal data, including: phishing, pharming, smishing – describe how it is possible to recognise when someone is attempting to obtain personal data, report the attempt and avoid the disclosure of information  – explain the difference between moderated and un-moderated forums and the relative security of these – explain the concept of and how to recognise spam mail and avoid being drawn into it – describe what encryption is and why it is used – define the term computer virus and describe its effects – describe the effects of infecting a computer with a virus from a downloaded file – describe how to take preventative action to avoid the danger of infecting a computer with a virus from a downloaded file – describe the measures that must be taken in order to protect against hacking – describe how it is possible to be the subject of fraud when using a credit card online – explain the issues related to security of data in the cloud – explain the concept of a firewall and why it is used – discuss the effectiveness of different methods of increasing security