1 / 10

ICT: Good or Bad?

Explore the various types of cybercrimes, such as cyberbullying and cyberterrorism, and the potential risks of data falling into the wrong hands. Learn about the advantages and disadvantages of using email and the internet, and discover how ICT can be used to prevent cybercrimes.

brendas
Download Presentation

ICT: Good or Bad?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICT: Good or Bad?

  2. This lesson will cover: • Some of the different types of cybercrimes. • Cyberbullying, cyberterrorism and the potential risks of data falling into the wrong hands. • The benefits and drawbacks of using e-mail and the Internet.

  3. Advantages and disadvantages

  4. The Internet and e-mail

  5. Cybercrimes How can ICT be used to prevent cybercrimes?

  6. Cyberbullying

  7. Cyberterrorism Cyberterrorism refers to the threat of terrorist groups attacking the computer systems of a country and causing harm. In May 2007, websites in Estonia were targeted by hackers due to controversy after a Soviet war memorial was removed. During the attacks, the networks of government ministries and banks were bombarded with so much traffic that they could not work. This was a ‘denial-of-service’ attack. In May 2010, the United States appointed General Keith Alexander as the head of the newly formed United States Cyber Command. Do you think ICT is more widely used to promote or prevent acts of terrorism?

  8. Data in the wrong hands

  9. Different opinions

  10. Class vote

More Related