Back to Explore

IGCSE ICT — Safety & Security (CAIE) Flashcards

Master IGCSE ICT — Safety & Security (CAIE) with these flashcards. Review key terms, definitions, and concepts using active recall to strengthen your understanding and ace your exams.

26 cards2 views
Flashcards
1 / 26
Electrocution

Click to flip

Electrocution is injury or death caused by electric current passing through the body. Common causes include contact between liquids and devices or exposed cables, and prevention includes keeping liquids away, using fully insulated cables, and installing circuit breakers or fuses.

Click to flip

Swipe to navigate between cards

Front

Electrocution

Back

Electrocution is injury or death caused by electric current passing through the body. Common causes include contact between liquids and devices or exposed cables, and prevention includes keeping liquids away, using fully insulated cables, and installing circuit breakers or fuses.

Front

Socket overload

Back

Socket overload happens when too many devices draw power from a single outlet, causing overheating and fire risk. Prevent it by providing enough sockets, not plugging many devices into one outlet, unplugging devices when unattended, and ensuring good ventilation.

Front

Trailing cables

Back

Trailing cables create trip hazards that can cause falls and bodily injury. Reduce risk by using cable ties, routing cables away from walkways, using wireless devices where possible, and regularly inspecting cables for damage.

Front

Falling equipment

Back

Heavy equipment falling can cause serious injury if not secured properly. Ensure devices are placed on stable surfaces, kept away from edges, and regularly check mounting or supports for wear.

Front

Data Protection Act

Back

The Data Protection Act requires personal data to be processed lawfully, fairly, and transparently for specified purposes. It mandates accuracy, limited retention, and protection against unauthorized access, and gives individuals rights over their data.

Front

GDPR

Back

The General Data Protection Regulation (GDPR) strengthens data protection rights across the EU and UK by regulating collection, storage, and processing of personal data. It applies to both paper and electronic records and emphasizes consent, transparency, and data subject rights.

Front

Personal data

Back

Personal data is any information that can identify an individual, such as name, address, date of birth, photographs, or medical history. Protecting this data prevents identity theft, privacy breaches, and misuse by third parties.

Front

Sensitive data

Back

Sensitive data includes information that could cause harm or discrimination if disclosed, for example ethnicity, religion, or criminal records. It requires higher protection and stricter handling than ordinary personal data.

Front

Reasons for data protection

Back

Data protection safeguards individual privacy, prevents misuse like identity theft or fraud, and builds trust between people and organizations. Legislation also enables rights such as access, rectification, erasure, and objection to processing.

Front

eSafety

Back

E-safety means using the internet, email, social media, and online gaming safely and responsibly to avoid risks and harms. It includes protecting personal information, recognizing scams, managing privacy settings, and maintaining a healthy online-offline balance.

Front

Phishing

Back

Phishing is a deceptive technique where attackers send fake emails or messages pretending to be trusted sources to trick people into revealing sensitive information. It often uses urgent language or spoofed sender addresses and may include malicious links or attachments.

Front

Pharming

Back

Pharming manipulates the Domain Name System (DNS) or local hosts files to redirect users to fraudulent websites without their knowledge. The goal is to steal credentials or other data even when the user types the correct website address.

Front

Smishing

Back

Smishing is phishing conducted via SMS or text messages that attempt to trick recipients into revealing personal information or clicking malicious links. It exploits the immediacy and informality of texting, so users should avoid following links from unknown senders.

Front

Vishing

Back

Vishing is voice-based phishing where attackers use phone calls or voicemail to persuade victims to disclose confidential information or call fraudulent numbers. Scams may impersonate banks or trusted organizations and use social engineering tactics.

Front

Malware types

Back

Malware is malicious software designed to damage systems, steal data, or gain unauthorized access; common types include viruses, worms, and Trojan horses. Viruses attach to files, worms spread across networks, and Trojans disguise themselves as legitimate programs.

Front

Keylogging

Back

Keylogging is malware that records keystrokes to capture passwords and other sensitive input. It can be installed via malicious downloads or phishing and is often used to commit identity theft or financial fraud.

Front

Shoulder surfing

Back

Shoulder surfing involves observing someone’s screen or keyboard to steal information such as PINs or passwords. Prevent it by shielding screens, using privacy filters, and being cautious in public spaces.

Front

Card fraud

Back

Card fraud is the unauthorized use of credit or debit card information and can occur through cloning, shoulder surfing, or keylogging. Protect cards by covering PIN entry, monitoring statements, and avoiding sharing card details online or over insecure channels.

Front

Biometrics

Back

Biometrics uses unique physical or behavioral traits like fingerprints, facial patterns, or iris scans for authentication. It is harder to fake than passwords but cannot be reset if compromised, so it is often combined with other security methods.

Front

Digital certificate

Back

A digital certificate is an electronic credential that binds a public key to an entity and is signed by a trusted third party (certificate authority). It provides assurance that a website or service is genuine and helps enable secure communications.

Front

SSL / HTTPS

Back

Secure Socket Layer (SSL) or its successor TLS creates an encrypted connection between a client and server so data cannot be intercepted or altered. The presence of HTTPS and a padlock icon in a browser indicates this secure connection.

Front

Encryption

Back

Encryption transforms data into a format that cannot be read without the appropriate decryption key, protecting information on drives, in emails, and in transit. Even if attackers obtain encrypted data, they cannot decode it without the key.

Front

Firewall

Back

A firewall monitors and filters incoming and outgoing network traffic according to predefined security rules to protect internal networks. It helps block unauthorized access and reduce the risk of malware and network attacks.

Front

Two-factor authentication

Back

Two-factor authentication (2FA) requires two different forms of identification, typically something you know (password) plus something you have (a phone token) or something you are (biometric). This adds significant security beyond a password alone.

Front

Strong passwords

Back

Strong passwords use a mix of uppercase and lowercase letters, digits, and special characters and should be changed regularly. They reduce the risk of unauthorized access and should be kept secret and unique for each account.

Front

Safe online behaviour

Back

Safe online behaviour includes not sharing personal information, checking privacy settings, using trusted websites, and thinking before you post. It also means reporting or blocking abusive contacts and discussing online activities with parents or guardians.

Create your own flashcards

Turn your notes, PDFs, and lectures into flashcards with AI. Study smarter with spaced repetition.

Get Started Free