1 / 11

INTERNET DANGERS

INTERNET DANGERS. INTERNET DANGERS. Internet threats can come in various forms or attacks. The internet can create the illusion that strangers are actually “friends”. The internet can damage your reputation. Common Forms of Digital Security Breach. Identity Theft Phishing Emails

miach
Télécharger la présentation

INTERNET DANGERS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTERNET DANGERS

  2. INTERNET DANGERS Internet threats can come in various forms or attacks. The internet can create the illusion that strangers are actually “friends”. The internet can damage your reputation

  3. Common Forms of Digital Security Breach • Identity Theft • Phishing Emails • Hacker and Cracker • Cyber Stalking • Cyber Bullying • Internet Predator

  4. Examples of Internet Danger Identity Theft Phishing Emails Hacker and Cracker Internet predator Cyber Stalking Cyber Bullying

  5. Shared Resources Versus Dedicated Resources Shared resources refer to devices or information on a computer that can be shared or accessed by many users for example : • Accessing folders • Files • Printers • Scanners • Emails

  6. Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user.

  7. Unethical Behavior • Using shared resources irresponsibly. • Causing interference or obstruction to other users’ access to network resources. • Using shared resources to do things that cause impairment.

  8. Implications of Violating the Use of Shared Resources • Breach of security. • The bandwidth can be congested or overwhelmed. • Increased software piracy.

  9. How to Permanently Erase the Data from Your Old Computer • First, dismantle the computer or laptop. • Second, take out the hard drive. • Lastly, physically destroy the hard drive.

  10. Conclusion By the end of this slide, we be able to : • Describe different forms of digital security breaches and take necessary precautions against those breaches. • Make efforts to update virus protection software and protect personal information.

  11. Identify the limits placed on the resources to be shared on global networked systems. • Evaluate unethical digital acts and security issues that affect the security of electronic data.

More Related