IT Fundamentals/2014/Safety
Safety is the state of being protected against the consequences of failure, damage, error, accidents, harm or any other event which could be considered non-desirable.[1] This lesson covers Internet safety, IT environmental issues, and related safety concepts.
Preparation
editLearners should already be familiar with Computer Use and Safety.
Objectives and Skills
editObjectives and skills for the security and safety portion of IT Fundamentals certification include:[2]
- Given a scenario, use web-browsing best practices
- Recognize a secure connection/website
- https
- lock symbol
- Recognize invalid certificate warnings
- Recognize suspicious links
- Recognize suspicious banner ads
- Recognize adware symptoms
- Constant popups
- Home page redirection
- Search engine redirection
- Limit the use of personal information (PII)
- Update browsers and plugins
- Avoid use of legacy browsers
- Disable unneeded/suspicious browser plugins, toolbars and extensions
- Disable autofill forms/passwords
- Clear browser cache/history/cookies
- Recognize untrusted source warnings
- Risks of using public workstations
- Recognize a secure connection/website
- Describe the importance and impact of various environmental and safety concepts
- Proper disposal methods
- RoHS
- CRT monitors
- Scanners
- Batteries
- Ink/toner
- Hard drives
- Power
- Energy efficient devices
- Power profiles
- Power options
- Sleep / hibernation
- UPS vs. surge protector vs. power strip
- Power limitations
- International power differences
- Device placement
- Airflow
- Humidity
- Temperature
- Dust accumulation
- EMI
- Electrostatic discharge concepts
- Ergonomic concepts
- Proper keyboard and mouse placement
- Sitting positions
- Monitor level placement
- Follow manufacturer safety guidelines
- Proper disposal methods
Readings
editMultimedia
edit- YouTube: Internet Safety: Your Browser's Security Features
- YouTube: Delete Browsing History
- YouTube: How to Clean Browser Cache, History and Delete Windows Temp Files
- YouTube: Understanding PKI
- YouTube: Computer Recycling
- YouTube: Improve your PC's Power Management
- YouTube: Managing Electrostatic Discharge
- YouTube: Computer Ergonomics
Activities
edit- Practice web browser safety.
- Review browser options:
- Chrome: Google: Choose Your Privacy Settings.
- Firefox: Mozilla: Privacy and Security Settings.
- Internet Explorer: Microsoft: Change Security and Privacy Settings for Internet Explorer.
- Safari: Apple: Manage Cookies and Other Website Data.
- Check your browser's version to ensure the browser is up to date.
- Check addins to ensure they are up to date.
- Disable unneeded addins.
- Clear the browser cache. Identify how to clear browser history and cookies.
- Check autoform settings and remove any personal information you do not want saved.
- Visit a secure website, such as https://en.wikiversity.org and view certificate information for that website.
- Use private / incognito browsing to visit a website that normally remembers you. Notice how you are unknown to the website when using private browsing.
- Review browser options:
- Recycle computer equipment.
- Review ElectronicsTakeBack: How to Recycle Electronics. Locate an electronics recycler in your area and consider recycling any old electronics you have collected.
- Erase hard drives before disposal.
- Windows: Review Archive.org: Microsoft: How to More Safely Dispose of Computers and Other Devices. Use Active@ KillDisk to erase a drive.
- OS X: Review MacTip: How to Securely Wipe Your Mac Hard Drive Before Selling It. Use Disk Utility to erase a drive.
- Linux: Review ArchLinux: Securely Wipe Disk. Use one of the Linux utilities or Active@ KillDisk to erase a drive.
- Configure power settings for energy efficiency vs. performance.
- Windows: Review Microsoft: Change, create, or delete a power plan. Use Power Options to configure power settings.
- OS X: Review Apple: About Energy Saver sleep and idle modes in Mac OS X. Use Energy Saver to configure power settings.
- Linux: Review ArchLinux: Power Management. Use either CLI or GUI system utilities to configure power settings.
- Android: Review WikiHow: Save Battery Power on an Android. Use Android Settings to configure power settings.
- iOS: Review ComputerWorld: 7 Power Saving Types for iOS. Use iOS Settings to configure power settings.
- Evaluate safety risks of your computing environment.
- Review OSHA: Computer Workstations eTool.
- Check your computing environment for surge suppressor or UPS, equipment placement, temperature, humidity, and any liquid hazards.
- Evaluate ergonomic placement of your display, keyboard, and mouse.
Lesson Summary
edit- Web browsing best practices include:[3]
- Using secure websites with valid certificates
- Recognizing suspicious links and ads, and untrusted sources
- Recognizing adware symptoms, including popups, home page redirection, and search engine redirection
- Using current browsers with updated plugins
- Disabling unneeded plugins, toolbars, and extensions
- Using or disabling autofill forms
- Clearing browser cache, history, and cookies
- Understanding the risks of using public workstations
- Limiting the use of personal information (PII)
- A public key infrastructure (PKI) uses a trusted certificate authority (CA) to validate and sign public key certificates.[4]
- A public key certificate contains the public key of the organization providing the certificate and the digital signature of the certificate authority that validated the certificate's information.[5]
- A digital signature uses the signer's private key to generate the signature, allowing the signature to be validated using the signer's public key.[6]
- Operating systems come pre-populated with public key certificates from certificate authorities.[7]
- Proper disposal of computer equipment includes using a qualified recycler for systems, monitors, scanners, batteries, ink and toner cartridges to keep hazardous materials from contaminating the environment.[8]
- Erase or wipe hard drives to eliminate sensitive information prior to disposal.[9]
- PC power management refers to the mechanism for controlling the power use of personal computer hardware. Common operating system power settings include sleep and hibernation modes.[10]
- Electrical power supply voltage and frequency varies between regions, with 120 volts and 60 cycles per second common in North America, and 230 volts and 50 cycles common in Europe. Voltage converters may be necessary for people traveling with mobile devices.[11]
- Computers should be placed in locations that have good airflow while minimizing humidity and temperature issues, minimize dust accumulation, and avoid disruption from EMI sources.[12]
- Electrostatic discharge (ESD) occurs when differently-charged objects are brought close together or when the dielectric between them breaks down, often creating a visible spark. ESD can cause damage to sensitive electronic devices.[13]
- Electrostatic discharge may be controlled through the use of ESD-safe packing material, the use of conductive filaments on garments worn by assembly workers, conducting wrist straps and foot-straps to prevent high voltages from accumulating on workers' bodies, anti-static mats or conductive flooring materials to conduct harmful electric charges away from the work area, and humidity control.[14]
- Physical ergonomics is the science of designing user interaction with equipment and workplaces to fit the user. Proper placement of screens, keyboards and mice can reduce eye-strain and repetitive stress injuries.[15]
Key Terms
edit- certificate authority (CA)
- An entity that issues digital certificates.[16]
- cookie
- A small piece of data sent from a website and stored in a user's web browser or browser cache while the user is browsing that website.[17]
- digital signature
- A mathematical scheme for demonstrating the authenticity of an electronic message or document.[18]
- EMI (Electromagnetic Interference)
- Disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source.[19]
- EMP (Electromagnetic Pulse)
- A short burst of electromagnetic energy.[20]
- ESD (Electrostatic Discharge)
- The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown.[21]
- hibernation
- Powering down a computer while retaining its state by saving the contents of random access memory (RAM) to a hard disk or other non-volatile storage.[22]
- personally identifiable information (PII)
- Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.[23]
- power strip
- A block of electrical sockets that attaches to the end of a flexible cable, allowing multiple electrical devices to be powered from a single electrical socket.[24]
- public key certificate
- An electronic document used to prove ownership of a public key based on the owner's identity, and the digital signature of an entity that has verified that identity.[25]
- RoHS (Recycling of Hazardous Substances)
- A European Union directive that restricts the use of hazardous materials in the manufacture of various types of electronic and electrical equipment.[26]
- sleep mode
- A low power mode for electronic devices which, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot.[27]
- surge protector
- An appliance that attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold.[28]
- voltage converter
- A device which changes the voltage of an electrical power source.[29]
- WEEE (Waste Electrical and Electronic Equipment) Directive
- A European Union directive that restricts disposal of electronic and electrical equipment due to hazardous waste.[30]
Review Questions
edit-
Web browsing best practices include:Web browsing best practices include:
Using secure websites with valid certificates
Recognizing suspicious links and ads, and untrusted sources
Recognizing adware symptoms, including popups, home page redirection, and search engine redirection
Using current browsers with updated plugins
Disabling unneeded plugins, toolbars, and extensions
Using or disabling autofill forms
Clearing browser cache, history, and cookies
Understanding the risks of using public workstations
Limiting the use of personal information (PII) -
A public key infrastructure (PKI) uses _____ to validate and sign public key certificates.A public key infrastructure (PKI) uses a trusted certificate authority (CA) to validate and sign public key certificates.
-
A public key certificate contains _____ and _____.A public key certificate contains the public key of the organization providing the certificate and the digital signature of the certificate authority that validated the certificate's information.
-
A digital signature uses _____ to generate the signature, allowing the signature to be validated using _____.A digital signature uses the signer's private key to generate the signature, allowing the signature to be validated using the signer's public key.
-
Operating systems come pre-populated with _____ from certificate authorities.Operating systems come pre-populated with public key certificates from certificate authorities.
-
Proper disposal of computer equipment includes using a qualified recycler for _____ to keep hazardous materials from contaminating the environment.Proper disposal of computer equipment includes using a qualified recycler for systems, monitors, scanners, batteries, ink and toner cartridges to keep hazardous materials from contaminating the environment.
-
Erase or wipe hard drives to _____ prior to disposal.Erase or wipe hard drives to eliminate sensitive information prior to disposal.
-
PC power management refers to the mechanism for controlling the power use of personal computer hardware. Common operating system power settings include _____ and _____ modes.PC power management refers to the mechanism for controlling the power use of personal computer hardware. Common operating system power settings include sleep and hibernation modes.
-
Electrical power supply voltage and frequency varies between regions, with _____ common in North America, and _____ common in Europe. _____ may be necessary for people traveling with mobile devices.Electrical power supply voltage and frequency varies between regions, with 120 volts and 60 cycles per second common in North America, and 230 volts and 50 cycles common in Europe. Voltage converters may be necessary for people traveling with mobile devices.
-
Computers should be placed in locations that have _____ while minimizing _____, and avoid _____.Computers should be placed in locations that have good airflow while minimizing humidity and temperature issues, minimize dust accumulation, and avoid disruption from EMI sources.
-
Electrostatic discharge (ESD) occurs when _____. ESD can cause damage to sensitive electronic devices.Electrostatic discharge (ESD) occurs when differently-charged objects are brought close together or when the dielectric between them breaks down, often creating a visible spark. ESD can cause damage to sensitive electronic devices.
-
Electrostatic discharge may be controlled through the use of _____,Electrostatic discharge may be controlled through the use of ESD-safe packing material, the use of conductive filaments on garments worn by assembly workers, conducting wrist straps and foot-straps to prevent high voltages from accumulating on workers' bodies, anti-static mats or conductive flooring materials to conduct harmful electric charges away from the work area, and humidity control.
-
Physical ergonomics is the science of _____. Proper placement of screens, keyboards and mice can reduce _____ and _____.Physical ergonomics is the science of designing user interaction with equipment and workplaces to fit the user. Proper placement of screens, keyboards and mice can reduce eye-strain and repetitive stress injuries.
Assessments
edit- Flashcards: Quizlet: IT Fundamentals - Safety
- Quiz: Quizlet: IT Fundamentals - Safety
See Also
editReferences
edit- ↑ Wikipedia: Safety
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ Wikipedia: Public key certificate
- ↑ Wikipedia: Public key certificate
- ↑ Wikipedia: Public key certificate
- ↑ Wikipedia: Public key certificate
- ↑ Wikipedia: Computer recycling
- ↑ Wikipedia: Computer recycling
- ↑ Wikipedia: PC power management
- ↑ Wikipedia: Mains electricity
- ↑ CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
- ↑ Wikipedia: Electrostatic discharge
- ↑ Wikipedia: Electrostatic discharge
- ↑ Wikipedia: Physical ergonomics
- ↑ Wikipedia: Certificate authority
- ↑ Wikipedia: HTTP cookie
- ↑ Wikipedia: Digital signature
- ↑ Wikipedia: Electromagnetic interference
- ↑ Wikipedia: Electromagnetic pulse
- ↑ Wikipedia: Electrostatic discharge
- ↑ Wikipedia: Hibernation (computing)
- ↑ Wikipedia: Personally identifiable information
- ↑ Wikipedia: Power strip
- ↑ Wikipedia: Public key certificate
- ↑ Wikipedia: Restriction of Hazardous Substances Directive
- ↑ Wikipedia: Sleep mode
- ↑ Wikipedia: Surge protector
- ↑ Wikipedia: Voltage converter
- ↑ Wikipedia: Waste Electrical and Electronic Equipment Directive