Page 25 - Knowledge Organiser Yr8 24-25
P. 25
Knowledge Base: Computing Cyber Crime & Computer Security Year 8 | Autumn Term 1
1. Email Scam
1.1
phishing email
An email that tricks you into handing over sensitive personal information.
1.2
trojan horse / malware
An email that offers something tempting and when opened, installs a virus onto your computer.
1.3
advance fee fraud
An email that is a long and desperate plea for help. The sender will claim they need cash from you.
1.4
virus- generated email
An email appearing to be sent from a friend, but a virus has infected their account and infects other accounts.
4. Copyright & Plagiarism
Copyright Plagiarism
4.1
impact Legal issue. Moral / ethical issue.
4.2 IP Address The computer's fingerprint.
5.2 disposing of equipment The impact of additional pollution and waste.
5.3 the perfect work station How to sit correctly to prevent injury
definition
Protection against unauthorised use of written or recorded content such as books, software or music.
Copying someone else’s work and passing it off as your own.
consequence
Imprisonment and fines can be issued. Work is removed.
Work is removed – can result in zero marks.
5. Health and safety
5.1
different types of health
and safety issues relating to prolonged use of technology.
Headaches Eye strain Back Problems
2. Computer Misuse Act
2.1
browser change
Changes browser functions such as your default search engines or browser history.
2.2
file infector
Infects a particular file. May overwrite or completely destroy the file
2.3
marco virus
Embedded in templates such as Word or Excel. The virus spreads if the file is opened on a different computer.
2.4
hacking
The gaining of unauthorized access to data in a system or computer.
3. Data Protection - GDPR
3.1
identity theft
The fraudulent practice of using another person's name and personal information.
3.2
General Data Protection Regulations. (GDPR)
Data protection legislation.
25