120 likes | 227 Views
Ways to overcome internet threats!. Identifying internet threats and mitigation. Description.
E N D
Ways to overcome internet threats! Identifying internet threats and mitigation
Description • The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.
Type of threat Cyber-bullying THREATthat embarrasses, mistreats or frightens its victim
Type of threat Cyber-stalking STALKING people by using Internet and Technology
Type of threat Identity theft Someone ILLEGALLYuses your personal information to form an Internet fraud
Type of threat Internet Predator a.k.aSEXUALpredator on the Internet
mitigation Report to authorized personal to take action
mitigation Only provide necessary personal data when needed. Eg. Sign up for social networking profile.
mitigation Check for security of the web url: “https” is the website that provides secure connection to user
mitigation Do not open or approved any pop-up message, spam email and etc.
THE END Free background music “Relaxing Music ( Instrumental Piano )” download from:- http://www.youtube.com/watch?v=94HYEe1bOFU&ob= Pictures downloaded from:- http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.html http://www.womenspress-slo.org/?p=3877 http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalking http://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/ http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtml http://www1.1citizen.com.my/Logo/Logo_1Citizen.png Prepared By:- MohamadFaqrullIzrall Bin Mat Fiah MohamdIzazuddin Bin Hassan