Monday, 8 May 2017

PROTECT DATA




Protecting sensitive data is the end goal of almost all IT security measures. Two strong arguments for protecting data are to avoid identity theft and to protect privacy.
The improper spreading of sensitive data can also cause harm and embarrassment to students, faculty, and staff, and potentially harm the reputation of the Institute or even yours. Therefore, it is to everyone's advantage to ensure that sensitive data is protected.

That’s why we have to be very careful of what we do with our personal info. Because even if we don’t realized, we share so many bits and pieces of our personal information online that sometimes is  more than what we are comfortable with. How many times have you had to give or insert your whole name, along with your home address and telephone numbers, schools, and information on past employment, hobbies… just to download a document or apps which may or may not have the data you had given? Chances are, it's too many. How many times did you rush to automatically click on the “Agree” or “I Accept” button on an End-User License Agreement that you didn't really read or understand? Just count how many apps there are on your mobile devices.

Why Consumers Should Actively Safeguard Personal Data


There are risks about losing that data privacy and especially for kids who are too hooked on technology so that they could share anything about their lives by accident. It is the role of parents, and educators to be aware of what can happen when privacy is violated online.

Cybercriminals violate consumer privacy because they can profit from it. Today, a global black market for stolen data exists across various countries.For example,  cybercriminals can sell online...
  • mobile phone numbers
  • email addresses
  • credit card numbers
  • online gaming account username and passwords
  • other personal information

Here are ten ways you can keep your personal details private:

3. SEND SAFELY

If you have to post personal documents, ask the post office for advice on the most secure method.

4. CHANGE PASSWORDS

Use different passwords and PINs for different accounts and take extra care when using public computers to access your personal information.

5. DON'T SHARE

Always think about who you are giving your information to. Be cautious about providing any personal details to unsolicited callers by phone, fax, post, email or in person, unless you are sure they person is who they say they are. If you are suspicious, ring the organisation back on an advertised number or visit their website.

6. STOP SPYWARE

“Buy a good anti-virus, firewall and anti-spam software package to protect your computer against viruses and any spyware software which can be used to obtain personal details.” says our expert.

7. PROTECT YOUR TEXTS

An app called TigerText allows text-message senders to set a time limit from one minute to 30 days after which the text disappears from the company’s servers on which it is stored and therefore from the senders’ and recipients’ phones.

8. DESTROY DATA

Researchers at the University of Washington are developing a technology called Vanish that makes electronic data ‘self-destruct’ after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the date on their servers, Vanish does the job.

9. GO OFFSHORE

Some companies, such as Connectinprivate.com, offer ‘anonymous and non-traceable offshore browsing’ for £5 a month. It’s done via a virtual private network, or VPN, which connects to the internet on your behalf so web services think you’re located in Canada, for example, rather than London. The VPN knows where you are, but in keeping with Canadian law, keeps no log of your activity.

10. UPDATE YOUR BROWSER

Microsoft plans to increase privacy options in the upcoming version of its Web browser Internet Explorer 9 (IE9), including the ability to prevent tracking by third-party websites.



https://www.trendmicro.com/vinfo/us/security/news/online-privacy/data-privacy-day-why-data-privacy-is-important  

DATA BROKERS
http://www.pcworld.com/article/2986988/privacy/the-price-of-free-how-apple-facebook-microsoft-and-google-sell-you-to-advertisers.html 







Friday, 24 March 2017

ICT


   hellooo!

  Now we have divided the subject, which is ICT and I'll be working with the data protection. So in this post I am publishing some links as an introduction onto the topic and I'm also doing a brainstorm to have an idea about what I could be saying in my presentation.


http://www.techrepublic.com/article/10-things-you-can-do-to-protect-your-data/

https://www.expedient.com/how-we-help/goals/protect-data/

What is protect data?
http://searchstorage.techtarget.com/definition/data-protection

Friday, 17 March 2017

EXAM QUESTIONS



   hiiiiii!

    This time we are asked to create our own questions about the themes we've been working on for the exam.

   Short questions (2):

  • What does the sentence "stem cells are pluripotent" mean?
It means that as stem cells don't have a particular function they can be grown into any specific tissue cell.
  • What do scientist hope they could do with stem cellsin the future? 
 Scientist hope  to make personalized medicines and also understand how our body works both when is healthy and when is not.

      Long question(1):
  • What are stem cells?
They are cells with no particular job which are pluripotent so that they have the ability to became any cell. And we distinguisse three types of them: adult stem cells, embryonic stem cells and incuded pluripotent stem cells.  

    Multiple choice questions(4):


1-Which is not a type of stem cell?

A.Embryonic
B.Somatic
C. Genetically modified
D.Induced Pluripotent

2-What does pluripotent mean?
  1. With no specific function.
  2. Full of colours.
  3. Died cells
  4. Small cells.

3- What can a stem cell do nowadays?
  1. Replace damage parts of an organ.
  2. Create new organs.
  3. Protect our body from infection.
  4. Kill bacteria

4- What are researchers trying to do with stem cells?
  1. Create personalized medicine and understand our bodies.
  2. Finish with all the ilnesses.
  3. Create new gadgets to improve operations.
  4. Discover pharmaceuticals  for animals.

Friday, 3 March 2017

VIDEO


helloo!

In this third term we are asked to do a presentation with a video which is already done. We have to choose a video about our specific topic on genetics and present it in front of the class.

In this way we will be working and learning about genetics by ourselves so that we can explain easily the subject we have been working on to the rest. In adddition, we'll improve our naturallity while we are speaking for a public.

For doing that we have to take into account the following aspects: the rehearsal of the video, the control we have refering to the topic, the content of the video itself and how we are communicating that. 

 The topic I was given, is stem cells and here I give you the link of my video, hope you like itttt!

https://www.youtube.com/watch?v=evH0I7Coc54


        

Friday, 3 February 2017

Pharmaceutical Industry



          hii!

  As i told you in an earlier entry, we made the presentation about pharmaceutical industry and this was our work.


http://pharmaceuticalluberri.weebly.com/

Friday, 13 January 2017

EUROPEAN SCIENTIST WOMEN


  heeeeeello!
 We are asked again to do something releated to Europe, Science and Women.
And we decided to to a magazine Quizz.
 
The thing is that another group from the class has suggested a great idea, so we are all helping to make the project get ahead. For that we are taking some pictures of us an by editing them with the app callled PRISMA to make a comic. As it has to be releated with the topic, it's about a girl that becomes a superhero called superscgirl.

Resultado de imagen de supergirl prisma