IGCSE ICT — Safety & Security (CAIE) Flashcards
Master IGCSE ICT — Safety & Security (CAIE) with these flashcards. Review key terms, definitions, and concepts using active recall to strengthen your understanding and ace your exams.
Swipe to navigate between cards
Front
Electrocution
Back
Electrocution is injury or death caused by electric current passing through the body. Common causes include contact between liquids and devices or exposed cables, and prevention includes keeping liquids away, using fully insulated cables, and installing circuit breakers or fuses.
Front
Socket overload
Back
Socket overload happens when too many devices draw power from a single outlet, causing overheating and fire risk. Prevent it by providing enough sockets, not plugging many devices into one outlet, unplugging devices when unattended, and ensuring good ventilation.
Front
Trailing cables
Back
Trailing cables create trip hazards that can cause falls and bodily injury. Reduce risk by using cable ties, routing cables away from walkways, using wireless devices where possible, and regularly inspecting cables for damage.
Front
Falling equipment
Back
Heavy equipment falling can cause serious injury if not secured properly. Ensure devices are placed on stable surfaces, kept away from edges, and regularly check mounting or supports for wear.
Front
Data Protection Act
Back
The Data Protection Act requires personal data to be processed lawfully, fairly, and transparently for specified purposes. It mandates accuracy, limited retention, and protection against unauthorized access, and gives individuals rights over their data.
Front
GDPR
Back
The General Data Protection Regulation (GDPR) strengthens data protection rights across the EU and UK by regulating collection, storage, and processing of personal data. It applies to both paper and electronic records and emphasizes consent, transparency, and data subject rights.
Front
Personal data
Back
Personal data is any information that can identify an individual, such as name, address, date of birth, photographs, or medical history. Protecting this data prevents identity theft, privacy breaches, and misuse by third parties.
Front
Sensitive data
Back
Sensitive data includes information that could cause harm or discrimination if disclosed, for example ethnicity, religion, or criminal records. It requires higher protection and stricter handling than ordinary personal data.
Front
Reasons for data protection
Back
Data protection safeguards individual privacy, prevents misuse like identity theft or fraud, and builds trust between people and organizations. Legislation also enables rights such as access, rectification, erasure, and objection to processing.
Front
eSafety
Back
E-safety means using the internet, email, social media, and online gaming safely and responsibly to avoid risks and harms. It includes protecting personal information, recognizing scams, managing privacy settings, and maintaining a healthy online-offline balance.
Front
Phishing
Back
Phishing is a deceptive technique where attackers send fake emails or messages pretending to be trusted sources to trick people into revealing sensitive information. It often uses urgent language or spoofed sender addresses and may include malicious links or attachments.
Front
Pharming
Back
Pharming manipulates the Domain Name System (DNS) or local hosts files to redirect users to fraudulent websites without their knowledge. The goal is to steal credentials or other data even when the user types the correct website address.
Front
Smishing
Back
Smishing is phishing conducted via SMS or text messages that attempt to trick recipients into revealing personal information or clicking malicious links. It exploits the immediacy and informality of texting, so users should avoid following links from unknown senders.
Front
Vishing
Back
Vishing is voice-based phishing where attackers use phone calls or voicemail to persuade victims to disclose confidential information or call fraudulent numbers. Scams may impersonate banks or trusted organizations and use social engineering tactics.
Front
Malware types
Back
Malware is malicious software designed to damage systems, steal data, or gain unauthorized access; common types include viruses, worms, and Trojan horses. Viruses attach to files, worms spread across networks, and Trojans disguise themselves as legitimate programs.
Front
Keylogging
Back
Keylogging is malware that records keystrokes to capture passwords and other sensitive input. It can be installed via malicious downloads or phishing and is often used to commit identity theft or financial fraud.
Front
Shoulder surfing
Back
Shoulder surfing involves observing someone’s screen or keyboard to steal information such as PINs or passwords. Prevent it by shielding screens, using privacy filters, and being cautious in public spaces.
Front
Card fraud
Back
Card fraud is the unauthorized use of credit or debit card information and can occur through cloning, shoulder surfing, or keylogging. Protect cards by covering PIN entry, monitoring statements, and avoiding sharing card details online or over insecure channels.
Front
Biometrics
Back
Biometrics uses unique physical or behavioral traits like fingerprints, facial patterns, or iris scans for authentication. It is harder to fake than passwords but cannot be reset if compromised, so it is often combined with other security methods.
Front
Digital certificate
Back
A digital certificate is an electronic credential that binds a public key to an entity and is signed by a trusted third party (certificate authority). It provides assurance that a website or service is genuine and helps enable secure communications.
Front
SSL / HTTPS
Back
Secure Socket Layer (SSL) or its successor TLS creates an encrypted connection between a client and server so data cannot be intercepted or altered. The presence of HTTPS and a padlock icon in a browser indicates this secure connection.
Front
Encryption
Back
Encryption transforms data into a format that cannot be read without the appropriate decryption key, protecting information on drives, in emails, and in transit. Even if attackers obtain encrypted data, they cannot decode it without the key.
Front
Firewall
Back
A firewall monitors and filters incoming and outgoing network traffic according to predefined security rules to protect internal networks. It helps block unauthorized access and reduce the risk of malware and network attacks.
Front
Two-factor authentication
Back
Two-factor authentication (2FA) requires two different forms of identification, typically something you know (password) plus something you have (a phone token) or something you are (biometric). This adds significant security beyond a password alone.
Front
Strong passwords
Back
Strong passwords use a mix of uppercase and lowercase letters, digits, and special characters and should be changed regularly. They reduce the risk of unauthorized access and should be kept secret and unique for each account.
Front
Safe online behaviour
Back
Safe online behaviour includes not sharing personal information, checking privacy settings, using trusted websites, and thinking before you post. It also means reporting or blocking abusive contacts and discussing online activities with parents or guardians.
Create your own flashcards
Turn your notes, PDFs, and lectures into flashcards with AI. Study smarter with spaced repetition.
Get Started Free