70 likes | 274 Views
Internet Danger. MOHAMAD AZAM BIN HASSAN MUHAMMAD SYAFIQ BIN MOHD SATA. Definition. Internet threats can come in various form or attacks The internet can create the illusion that strangers are actually “friends” The internet can damage your reputation. Identity Theft. Internet Predator.
E N D
Internet Danger MOHAMAD AZAM BIN HASSAN MUHAMMAD SYAFIQ BIN MOHD SATA
Definition • Internet threats can come in various form or attacks • The internet can create the illusion that strangers are actually “friends” • The internet can damage your reputation
Identity Theft Internet Predator Digital Security Beach Phishing Emails Cyber Bullying Hacker and Crackers Cyber Stalking
Shared Resources vs Dedicated Resources • Shared resources refer to devices or information on a computer that can be shared or accessed by many users; eg. Accessing folders, files, printers, scanner, emails and others. • Dedicated resources refer to a direct connection between a terminal and a service, network or computer to the specific use of a speticular user.
Unethical Behavior • Using shared resources irresponsibly such as : • Downloading pirated software • Printing a lot of personal files • Storing files that have nothing to do with work such as personal photo files in the shared storage • Causing interference or obstruction to the others access to network resources such as the use of network bandwidth for downloading large files during the working hours • Using shared resources to do thing that cause impairment such as sending spam e-mails to customers
Implications of Violating The Use of Shared Resources • Breach of security • The bandwidth can be congested or overwhelmed • Increased software piracy
How To Permanently Erase Data From Your Old Computer? • First, dismantle the computer or laptop • Second, take out the hard drive • Finally, physically destroy the hard drive