Download
internet dangers n.
Skip this Video
Loading SlideShow in 5 Seconds..
INTERNET DANGERS PowerPoint Presentation
Download Presentation
INTERNET DANGERS

INTERNET DANGERS

336 Vues Download Presentation
Télécharger la présentation

INTERNET DANGERS

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. INTERNET DANGERS

  2. INTERNET DANGERS Internet threats can come in various forms or attacks. The internet can create the illusion that strangers are actually “friends”. The internet can damage your reputation

  3. Common Forms of Digital Security Breach • Identity Theft • Phishing Emails • Hacker and Cracker • Cyber Stalking • Cyber Bullying • Internet Predator

  4. Examples of Internet Danger Identity Theft Phishing Emails Hacker and Cracker Internet predator Cyber Stalking Cyber Bullying

  5. Shared Resources Versus Dedicated Resources Shared resources refer to devices or information on a computer that can be shared or accessed by many users for example : • Accessing folders • Files • Printers • Scanners • Emails

  6. Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user.

  7. Unethical Behavior • Using shared resources irresponsibly. • Causing interference or obstruction to other users’ access to network resources. • Using shared resources to do things that cause impairment.

  8. Implications of Violating the Use of Shared Resources • Breach of security. • The bandwidth can be congested or overwhelmed. • Increased software piracy.

  9. How to Permanently Erase the Data from Your Old Computer • First, dismantle the computer or laptop. • Second, take out the hard drive. • Lastly, physically destroy the hard drive.

  10. Conclusion By the end of this slide, we be able to : • Describe different forms of digital security breaches and take necessary precautions against those breaches. • Make efforts to update virus protection software and protect personal information.

  11. Identify the limits placed on the resources to be shared on global networked systems. • Evaluate unethical digital acts and security issues that affect the security of electronic data.