SlideShare ist ein Scribd-Unternehmen logo
1 von 22
AO4 – Implications and Security
    Issues of the Internet
      Unit 24:- Internet Past, Present and Future
Introduction

• Moral/ethical issues

• Social implications

• Commercial
Moral/ethical issues

Pornography

Chat rooms
Pornography

Has a number of negative effects on individuals and society.

 Research has shown pornography has potential influences
such as rape, domestic violence and sexual dysfunction.

Viewing of pornographic material may increase rates of
sexual crimes.

Child pornography is a growing concern and can have
devastating effects.
Chat rooms
   Sexual
 - Opens the doors to sexual predators
 - Used to share illegal and pornographic substances such as
child pornography.
   Cyber bullying
- Internet provides anonymity for those wishing to harass, insult
or stalk others.
- Easy to become a victim of cyber bullying through
Facebook, message boards etc.
   False identity
- Accounts can be created in seconds with false identities, profiles
and email addresses.
Social implications

Increased addiction

Changes in working practices
Increased addiction
Internet addiction disorder

Excessive computer use interferes with daily life.

Shopping and gambling

25% of users fulfil the internet addiction criteria within the
first 6 months of first using the internet.
Changes in working practises
More people now work from home

Internet provides 24/7 access to work
Commercial
24 hour shopping

Advertising
24 Hour shopping
Online deliveries

Improved security

Easy methods of paying online

Data tracking services
Advertising
Online advertising is very popular and has grown hugely

Interactive advertisements

Email

Search engine result pages
Security risks
Viruses, Trojans, Worms, Spyware, Malware

Hackers

Phishing

Identity theft

Email attachments
Viruses, Trojans, Worms, Spyware, Malwa
                    re
Virus is a program which copies itself and infects a PC

Trojans are programs which pretend to be another program or
something else. They can delete files on a computer.

A worm replicates itself in order to spread to other
computers.

Spyware and Malware are often installed onto a computer
without the users knowledge.
Hackers
A computer hacker is an individual who finds weaknesses
within a computer system and exploits them.

It can be authorized or unauthorized.

Hackers are today commonly associated with malicious
programming attacks on the internet.
Phishing
An attack where you are sent an email or phone call which
asks you to click on a link and re enter your bank or credit
card details.

They pretend to be from banks, online stores and service
providers.

They appear genuine when in reality they are a fraud and will
steal your details using them to their own advantage.
Identity theft
Identity theft is a form of stealing someone else’s identity.

 Made easy due to the internet as people reveal personal
information on the internet about themselves.

If someone is able to access someone else’s personal
information they can commit fraud under their name.
Email attachments
Hold big risks such as spread of malware, trojans and
worms.

This is because emails contain attachments which may
contain viruses which can infect your computer.

This happens once the infected email is opened.
Protection techniques
Fire walls

Anti virus

Code of practice

Encryption

Secure payment systems
Firewalls
A device which is designed to deny access to any
unauthorized programs.

Many personal computer operating systems include firewalls
which protect the computer from harm.
Anti virus
Anti virus software is used to prevent, detect and remove
any sort of malware.

Scans computers for viruses

It is important that anti virus software's are updated
regularly.
Encryption
Translation of data into a secret code

In order to read encrypted data you must have access to a
secret key or a password.

This can be used with important files. So if hackers were to
get hold of the files they would not understand or be able to
read the file without the password or key.
Secure payment systems
With secure payment systems customers are reassured that
their payments are secure.

Several methods have been introduced which make
payments secure.

SSL, HTTPS, PayPal

Weitere ähnliche Inhalte

Was ist angesagt?

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 

Was ist angesagt? (20)

Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Digital security
Digital securityDigital security
Digital security
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Andere mochten auch

Pronóstico
PronósticoPronóstico
Pronóstico4paulo74
 
Silabusmat xii peminatan
Silabusmat xii peminatanSilabusmat xii peminatan
Silabusmat xii peminatanHenry Kurniawan
 
Improveon naming guidelines
Improveon naming guidelinesImproveon naming guidelines
Improveon naming guidelinesDavid Green
 
100PercentPureJavaCookbook-4_1_1
100PercentPureJavaCookbook-4_1_1100PercentPureJavaCookbook-4_1_1
100PercentPureJavaCookbook-4_1_1AbrarMoiz
 
Physics quiz no 1 (1)
Physics quiz no 1 (1)Physics quiz no 1 (1)
Physics quiz no 1 (1)poloreyes4e
 
Improveon wellbeing strategy development
Improveon wellbeing strategy developmentImproveon wellbeing strategy development
Improveon wellbeing strategy developmentDavid Green
 
Physics quiz no 1 (2)
Physics quiz no 1 (2)Physics quiz no 1 (2)
Physics quiz no 1 (2)poloreyes4e
 
Physics quiz no 1 (3)
Physics quiz no 1 (3)Physics quiz no 1 (3)
Physics quiz no 1 (3)poloreyes4e
 

Andere mochten auch (10)

Pronóstico
PronósticoPronóstico
Pronóstico
 
Study in canada
Study in canadaStudy in canada
Study in canada
 
Silabusmat xii peminatan
Silabusmat xii peminatanSilabusmat xii peminatan
Silabusmat xii peminatan
 
Improveon naming guidelines
Improveon naming guidelinesImproveon naming guidelines
Improveon naming guidelines
 
100PercentPureJavaCookbook-4_1_1
100PercentPureJavaCookbook-4_1_1100PercentPureJavaCookbook-4_1_1
100PercentPureJavaCookbook-4_1_1
 
Physics quiz no 1 (1)
Physics quiz no 1 (1)Physics quiz no 1 (1)
Physics quiz no 1 (1)
 
Matematika lafadz
Matematika lafadzMatematika lafadz
Matematika lafadz
 
Improveon wellbeing strategy development
Improveon wellbeing strategy developmentImproveon wellbeing strategy development
Improveon wellbeing strategy development
 
Physics quiz no 1 (2)
Physics quiz no 1 (2)Physics quiz no 1 (2)
Physics quiz no 1 (2)
 
Physics quiz no 1 (3)
Physics quiz no 1 (3)Physics quiz no 1 (3)
Physics quiz no 1 (3)
 

Ähnlich wie Ao4 powerpoint mrs hussain

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sARYAS87
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 

Ähnlich wie Ao4 powerpoint mrs hussain (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Ao4 powerpoint mrs hussain

  • 1. AO4 – Implications and Security Issues of the Internet Unit 24:- Internet Past, Present and Future
  • 2. Introduction • Moral/ethical issues • Social implications • Commercial
  • 4. Pornography Has a number of negative effects on individuals and society. Research has shown pornography has potential influences such as rape, domestic violence and sexual dysfunction. Viewing of pornographic material may increase rates of sexual crimes. Child pornography is a growing concern and can have devastating effects.
  • 5. Chat rooms Sexual - Opens the doors to sexual predators - Used to share illegal and pornographic substances such as child pornography. Cyber bullying - Internet provides anonymity for those wishing to harass, insult or stalk others. - Easy to become a victim of cyber bullying through Facebook, message boards etc. False identity - Accounts can be created in seconds with false identities, profiles and email addresses.
  • 7. Increased addiction Internet addiction disorder Excessive computer use interferes with daily life. Shopping and gambling 25% of users fulfil the internet addiction criteria within the first 6 months of first using the internet.
  • 8. Changes in working practises More people now work from home Internet provides 24/7 access to work
  • 10. 24 Hour shopping Online deliveries Improved security Easy methods of paying online Data tracking services
  • 11. Advertising Online advertising is very popular and has grown hugely Interactive advertisements Email Search engine result pages
  • 12. Security risks Viruses, Trojans, Worms, Spyware, Malware Hackers Phishing Identity theft Email attachments
  • 13. Viruses, Trojans, Worms, Spyware, Malwa re Virus is a program which copies itself and infects a PC Trojans are programs which pretend to be another program or something else. They can delete files on a computer. A worm replicates itself in order to spread to other computers. Spyware and Malware are often installed onto a computer without the users knowledge.
  • 14. Hackers A computer hacker is an individual who finds weaknesses within a computer system and exploits them. It can be authorized or unauthorized. Hackers are today commonly associated with malicious programming attacks on the internet.
  • 15. Phishing An attack where you are sent an email or phone call which asks you to click on a link and re enter your bank or credit card details. They pretend to be from banks, online stores and service providers. They appear genuine when in reality they are a fraud and will steal your details using them to their own advantage.
  • 16. Identity theft Identity theft is a form of stealing someone else’s identity. Made easy due to the internet as people reveal personal information on the internet about themselves. If someone is able to access someone else’s personal information they can commit fraud under their name.
  • 17. Email attachments Hold big risks such as spread of malware, trojans and worms. This is because emails contain attachments which may contain viruses which can infect your computer. This happens once the infected email is opened.
  • 18. Protection techniques Fire walls Anti virus Code of practice Encryption Secure payment systems
  • 19. Firewalls A device which is designed to deny access to any unauthorized programs. Many personal computer operating systems include firewalls which protect the computer from harm.
  • 20. Anti virus Anti virus software is used to prevent, detect and remove any sort of malware. Scans computers for viruses It is important that anti virus software's are updated regularly.
  • 21. Encryption Translation of data into a secret code In order to read encrypted data you must have access to a secret key or a password. This can be used with important files. So if hackers were to get hold of the files they would not understand or be able to read the file without the password or key.
  • 22. Secure payment systems With secure payment systems customers are reassured that their payments are secure. Several methods have been introduced which make payments secure. SSL, HTTPS, PayPal

Hinweis der Redaktion

  1. Child pornography has physical, social, and psychological effects on children.
  2. Increased addiction to the internet has now become so known that is now known as an Internet addiction disorder. The introduction and ease of online activities such as online gambling and online shopping has contributed to the increased addiction to the internet.
  3. Working from home is known as teleworking. We are able to do this due to the advancements of technology and the internet. You are able to work from home if you have a phone, a computer and internet connection. This saves on travelling and other issues. 15,000 out off the 35,000 staff in HSBC bank have the ability to work from home due to the internet.
  4. The internet has allowed for shopping to be carried out 24/7 as only a computer and internet connection are needed to purchase items online. So unlike in a shop, customers are able to purchase items at any time of the day. Online deliveries are widely available for nearly every shopping website. The improved security such as the introduction of PayPal which is a very secure online payment method has contributed to customers feeling safe about paying online, therefore increasing the number of buyers who purchase goods online. There are also data tracking services which track the journey of your ordered item so you are able to know where it is and when it will come to you.
  5. Online advertising is a form of promotion which uses the internet to do so and to attract customers . It is a very popular form of promotion and has grown hugely, delivering marketing messages to all ranges. Online advertising allows for interactive advertisements such as video and moving pictures. It is a very successful method of promoting as nearly all people use the internet. Email is a popular way of sending advertisements to customers and other individuals. However this can be a major problem as unwanted email can be sent which is known as spam. Another popular place for advertising to be seen on the internet is on search engine result pages. Nearly every page has some sort of advertisement or promotion on it.
  6. A virus is a program which copies itself and infects a computer with harmful data spreading from one file to another and from one computer to another. This is able to happen when files are copied onto a different computer or shared. Trojans are programs which pretend to be another program. So for example an email sent to someone could contain a sound file which looks legitimate. But when the file is opened it may install a virus onto the users hard drive which may delete system files or damage the computer. A worm replicates itself in order to spread to other computers and carry threats which can cause a considerable amount of damage. Threats include damage to the operating system and they allow hackers to gain access to computers which they infect.Spyware and Malware are often installed onto a computer without the users knowledge and record behaviour on the internet. They are sometimes included in programs which you are able to download free from the internet.
  7. Authorized hackers are those which are certified and are allowed to hack into certain computers for reasons such as protecting the country form attack or so on. Unauthorized hackers on the other hand is not certified and is seen as a crime in most countries.
  8. Phishing email messages, phone calls and websites are designed to steal your money. They appear genuine but in reality are not real, but rather want to steal your bank or credit card details.
  9. Identity theft is where an individual impersonates someone usually for a financial gain.Personal information includes security numbers, signatures, addresses, phone numbers and banking and credit card information.So someone who accesses another individual’s personal information is carrying out identity theft.
  10. Encryption is the most effective way to keep data safe. With a secret key or password you are able to decrypt the encryption.
  11. SSL stands for secure sockets layer. This provides customers secure payments by using encryptions across a network.HTTPS also provides encryption across a network but uses authentication as well.PayPal is a safe online payment method which has been recently introduced.