1 / 12

Dangers of the Internet

Dangers of the Internet. Shelby Foster. Unconscious Risks. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization

dalton
Télécharger la présentation

Dangers of the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dangers of the Internet Shelby Foster

  2. Unconscious Risks • Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course of conduct, more than one instance, that would cause a reasonable person fear," -Michael Kaiser, the Executive Director of the National Cyber Security Alliance. • Cyberbullying- extension of bullying through electronic devices -releasing photos without consent, posing threats, false accusations, harassment, peer pressure, bribery

  3. 18.2 - 60 Threats of death or bodily harm to a person or member of his family-threats to commit serious bodily harm to persons on school property A) Any person who knowingly communicates including electronically transmitted communication, a threat to kill or do bodily injury to a person, is guilty of class 6 felony

  4. Identity Theft -Identity theft includes stealing of Name Money Credit Social Security • What’s needed to steal Social Security- Address, phone number, birthday, full name, then hackers begin guessing your social until they get it right • Only a couple hundred numbers…

  5. Public Computers • Accessed by anybody • Don’t do anything on a computer involving sensitive information • Not logging out, and only exiting the browser= Not good -people can browse your history and login to the site you never logged out on.

  6. Prevent Cyber Stalking • Be careful what information you share online • Consider using a nickname • Maintain a current knowledge of current privacy settings for everything Ex: Facebook, twitter, Instagram, Myspace… • Do an Internet search regularly

  7. Prevent Cyberbullying • Don’t be gullible • Don’t respond to messages in anger • Ignore and Save • Don’t care

  8. Prevent Identity Theft • Don’t use the Internet at all • Phishing Websites - Social Security -Credit card # -Bank account # -Drivers License # -Home address and phone # • Use anti-virus software • Use unique passwords

  9. National Security Agency • Definition- is the requirement to maintain the survival of the state through the use of economic power, diplomacy, power projection and political power. How they maintain security: Phones Emails Social Media Text Messages

  10. Rights • Fourth Amendment’s provisions against warrantless searches. • First Amendment – “right of association” - People might not want to be in the association, if they know they’re being watched, creating an intimidation factor

  11. NSA Facts • Can hand over information • Monitors internationally and Domestically • Busch warranted warrantless surveillance in 2005 • NSA won’t say whether it spies on Congress. • New documents reveal massive scope of NSA spying in 60 countries, targeting regulators, aid organizations and many others with no connection to terrorist or illegal activities. • NSA can access private data on iPhones, BlackBerry and Android devices.

  12. How do you feel? http://www.youtube.com/watch?v=Q_qdnyEqCPk

More Related