1 / 0

Breaking Trust On The Internet

Breaking Trust On The Internet. Ethical and Social Issues in Information Systems By Prosper Oli stdno : 117424. INTRODUCTION:. What is Internet?

deidra
Download Presentation

Breaking Trust On The Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Breaking Trust On The Internet

    Ethical and Social Issues in Information Systems By Prosper Oli stdno: 117424
  2. INTRODUCTION: What is Internet? TheInternet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. What is Trust? Complete confidence in something.
  3. INTRODUCTION(continue) Internet is today one of the most important part of our daily life. There are large numbers of things that can be done using the internet and is used for different purposes depending upon the requirement. Easy and cheap communication Share files with others easily. Loads of information Financial Transaction services
  4. INTRODUCTION(continue) Then this presentation is on the BREAK of that trust in the accept of internet perspective.
  5. Breaking Trust on the Internet Identity Theft Phishing. Chat Room Predators False Information Cyber Bullying E-mail Spam Virus Threat Security
  6. Identity Theft Definition: when someone uses your personal information without your permission to commit fraud or other crime. This can be done in various ways like using someone’s Name. Social security number. Credit card number. Bank account number. Etc.
  7. Identity Theft Graph
  8. How it Occurs Phishing: Emails that appear to be from IRS requesting you to confirm information. Emails that are thanking you for a recent purchase (or something you didn’t buy).
  9. Examples of Phishing
  10. Chat Room Predators Chat room: supports real-time discussions among many people connected to network Some pedophiles(any sexual interest in children or the act of child sexual abuse, often termed "pedophilic behavior".) meeting children, Through chat rooms.
  11. False information Quality of web-based information varies widely. Internet helps spread false information Anybody can write and update false information on the internet through blog or other means. Not everything on the internet is accurate or correct.
  12. Cyber bullying What Is Cyber bullying? Cyber bullyingis the use of technology to harass, threaten, embarrass, or target another person. By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time.
  13. E-mail spam Electronic spamming is the use of electronic messaging systems to send unwanted bulk messages (spam), especially advertising.While the most widely recognized form of spam is e-mail spam, 
  14. Virus Threat A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. 
  15. Virus threat case A hacker provided electronic files containing hotel advertisements to the newspaper, which began running the advertisements on its website. He then replaced the hotel advertisements with a file containing a malicious computer code, or malware, which infected the computers of people who visited the website and required them to purchase antivirus software for $49.95 to regain control of their computers. If the users did not purchase the software, their computers immediately became flooded with pop-ups containing false "security alerts," and all information, data and files stored on the computers became unreachable. http://www.fbi.gov/wanted/cyber/peteris-sahurovs
  16. Security Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.
  17. Security Its objective is to establish rules and measures to use against attacks over the Internet.  The Internet represents an insecure channel for exchanging information leading to a high risk of fraud, such as phishing.  Different methods have been used to protect the transfer of data, including encryption.
  18. Security
  19. Security break case Attackers forge Google's Gmail credentials Skype, Microsoft, Yahoo, Mozilla also targeted Extremely sophisticated hackers, broke into the servers of a web authentication authority and counterfeited certificates for Google mail and six other sensitive addresses. http://www.theregister.co.uk/2011/03/23/gmail_microsoft_web_credential_forgeries/
  20. Final thoughts Know this, your bank will NEVER ask you for account number or password. Law Enforcement needs to be aware of: Difference between annoying and dangerous communications How to investigate a cyber crime How to obtain information from an ISP
  21. QUESTION TIME
More Related