1 / 54

Test

Testing 1234

ieza
Download Presentation

Test

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PRESENTS POWERED BY THE ADAB Aaron I. Mokhtar Sr. Executive Content R&D Outreach Department OF A DIGITAL CITIZEN

  2. 2

  3. PERUBAHAN TABIAT VS. PENINGKATAN ILMU 5

  4. 6

  5. 7

  6. 8

  7. 9

  8. 10

  9. 11

  10. 12

  11. PENGGUNA INTERNET DI MALAYSIA YANG MELAYARI LAMAN WEB 25.3 JUTA 89% daripada jumlah penduduk Malaysia (28.4m) 13

  12. 30 MILLION MOBILE USERS 14

  13. 15

  14. 16

  15. 17 Copyright © 2011 CyberSecurity Malaysia

  16. 1.3 BILLION 1.2 BILLION 1.1 BILLION

  17. 21 Copyright © 2011 CyberSecurity Malaysia

  18. FRIENDS 22 Copyright © 2010 CyberSecurity Malaysia

  19. JAPAN? 23 Copyright © 2010 CyberSecurity Malaysia

  20. FRIENDS 24 Copyright © 2010 CyberSecurity Malaysia

  21. 25 Copyright © 2011 CyberSecurity Malaysia

  22. 26

  23. 27 Copyright © 2011 CyberSecurity Malaysia

  24. Copyright © 2011 CyberSecurity Malaysia

  25. 29

  26. 30

  27. Type of incidents Content Related Cyber Harassment Fraud Intrusion Intrusion Attempt Malicious Code Spam Vulnerabilities Report Denial of Service 14157 12000 8090 10000 8000 . 6000 3564 4000 2123 1372 1038 2000 81 196 527 347 860 625 912 915 835 0 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Number of cyber security incidents referred to CyberSecurity Malaysia 31

  28. 5,581 INSIDEN YANG DILAPORKAN 32

  29. 33 Copyright © 2010 CyberSecurity Malaysia

  30. SHARING IS CARING 34 Copyright © 2010 CyberSecurity Malaysia

  31. OVER-SHARING IS CARELESS 35 Copyright © 2010 CyberSecurity Malaysia

  32. 36

  33. 37

  34. 38

  35. 39

  36. MAIN METHODS 40

  37. Stuff YOU Put Online 41

  38. Stuff OTHERS Put Online 42

  39. Stuff the Internet NEEDS 43

  40. 44 Copyright © 2010 CyberSecurity Malaysia

  41. 45

  42. 46 Copyright © 2010 CyberSecurity Malaysia

  43. 47 Copyright © 2010 CyberSecurity Malaysia

  44. One more thing... 48

  45. 49

  46. Protect yourself by Protect yourself by Be discreet: Never type anything into online electronic form that would expose you to unwanted visitors or the possibility of identity theft or malicious threats Be skeptical: Treat anything you see online -- advance news, personnel gossip and so on -- with a high degree of skepticism Be thoughtful: Never type anything online that can come back to bite you later. Be professional: Dress professionally and, above all, don't disrobe or wear a funny hat. Be wary: People on the Internet are not always who they seem to be 50 Copyright © 2011 CyberSecurity Malaysia

More Related