Page 89 - TP_IT_V1.0_C10_flipbpookl
P. 89
• Do not use your personal or business email address when registering in any online contest or free services available
on the internet.
20 to 50 million metric tons of e-waste are disposed worldwide every year. Only 12.5% of
e-waste is currently recycled.
COMPUTER SECURITY AND PRIVACY
Computer security and privacy is about measures we can take to protect your computer, personal information, and
online activities from unauthorized access, cyber threats, and privacy breaches. For example To access your online
banking account, you use a combination of a strong password and a two-factor authentication (2FA) method, such as
receiving a verification code on your mobile device. In another example of a Health Information Management System,
used by healthcare providers, employs strict access controls. Only authorised personnel with unique login credentials
can access patient records.
Reasons for Security Break
Security break refers to the unauthorised access of sensitive information stored in a computer. Personal information
can be lost or leaked in two ways:
• We are not careful in giving out personal information over the Internet. For example, we share our account details
and passwords on unsecure sites.
• A person gets unauthorised access to our computer. This can happen in the office if we leave the computer without
logging out.
Threats to Computer
Threats refers to the potential risk or dangers in which personal information can be leaked from a computer without
our knowledge.
Some of the common threats to the computer are:
(a) Theft: Theft means stealing of information or sensitive or confidential data stored on a computer. These maybe of
three types:
• Physical: Where a person may steal your desktop computer or laptop.
Information and Communication Technology Skills-II 87

