| 0417 Information and Communication Technology Past Paper Resources
Paper 1 Topic Questions and Mark Schemes / Topic 8 Safety and Security
  • 8.1-IGCSE-physical-safety-Mark-Scheme-Paper-1-Set-1.pdf
  • 8.1-IGCSE-physical-safety-Mark-Scheme-Paper-1-Set-2.pdf
  • 8.1-IGCSE-physical-safety-Topic-Questions-Paper-1-Set-1.pdf
  • 8.1-IGCSE-physical-safety-Topic-Questions-Paper-1-Set-2.pdf
  • 8.2-IGCSE-e-safety-Mark-Scheme-Paper-1-Set-1.pdf
  • 8.2-IGCSE-e-safety-Mark-Scheme-Paper-1-Set-2.pdf
  • 8.2-IGCSE-e-safety-Mark-Scheme-Paper-1-Set-3.pdf
  • 8.2-IGCSE-e-safety-Topic-Questions-Paper-1-Set-1.pdf
  • 8.2-IGCSE-e-safety-Topic-Questions-Paper-1-Set-2.pdf
  • 8.2-IGCSE-e-safety-Topic-Questions-Paper-1-Set-3.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-1.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-2.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-3.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-4.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-5.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-6.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-7.pdf
  • 8.3-IGCSE-security-of-data-Mark-Scheme-Paper-1-Set-8.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-1.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-2.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-3.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-5.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-6.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-7.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questions-Paper-1-Set-8.pdf
  • 8.3-IGCSE-security-of-data-Topic-Questionss-Paper-1-Set-4.pdf
Note:

Safety and Security IGCSE Information and Communication Technology  IGCSE ICT  Topic Questions

The following topics are included:

8.1 Physical safety: Candidates should know and understand: Safety issues Notes and Guidance Including: electrocution from spilling drinks near electrical equipment and touching live cables, fire from sockets being overloaded or equipment overheating, tripping over trailing cables, heavy equipment falling and injuring people The causes of these safety issues and strategies for preventing them

8.2 eSafety Candidates should know and understand: Data protection Notes and Guidance The principles of a typical data protection act and why data protection legislation is required Personal data Characteristics of personal and sensitive data including personal name, address, date of birth, a photograph in school uniform, medical history The need for personal data to be kept confidential and protected to avoid inappropriate disclosure eSafety The need for eSafety when using the internet, email, social media, online gaming Minimise the potential danger of using: The internet including only using trusted websites recommended by teachers, using a search engine that only allows access to age appropriate websites Email including an awareness of the potential dangers of opening or replying to an email from an unknown person. An awareness of the risks associated with sending personal identifiable data or images via email continued.  Social media including knowing how to block and report unwanted users, an awareness of the potential dangers of meeting an online contact face to face, avoiding the distribution of inappropriate images, avoiding the use of inappropriate language, respecting confidentiality of personal data of other people Online gaming including not using real names, not giving out personal or financial data

8.3 Security of data Candidates should know and understand: Threats to data Notes and Guidance Characteristics and effect of threats to data including hacking, phishing, pharming, smishing, vishing, viruses, malware, card fraud Hacking including the measures that must be taken in order to protect data Phishing, pharming, smishing, vishing including the methods that can be used to help prevent them Viruses and malware including how to take preventative action to avoid the danger of infecting a computer from a downloaded file Card fraud including shoulder surfing, card cloning, key logging Protection of data Characteristics and methods of protecting data including biometrics, digital certificate, secure socket layer (SSL), encryption, firewall, two-factor authentication, user id and password Biometrics including the use of biometric data Digital certificate including its purpose and contents Secure socket layer (SSL) including encrypted links between the server and the client computer Encryption including its purpose for the protection of data on hard discs, email, cloud, HTTPS websites Firewall including its purpose Two-factor authentication including its purpose and function User id and password including how they are used to increase the security of data