1 / 7

Internet Danger

Internet Danger. MOHAMAD AZAM BIN HASSAN MUHAMMAD SYAFIQ BIN MOHD SATA. Definition. Internet threats can come in various form or attacks The internet can create the illusion that strangers are actually “friends” The internet can damage your reputation. Identity Theft. Internet Predator.

thao
Download Presentation

Internet Danger

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Danger MOHAMAD AZAM BIN HASSAN MUHAMMAD SYAFIQ BIN MOHD SATA

  2. Definition • Internet threats can come in various form or attacks • The internet can create the illusion that strangers are actually “friends” • The internet can damage your reputation

  3. Identity Theft Internet Predator Digital Security Beach Phishing Emails Cyber Bullying Hacker and Crackers Cyber Stalking

  4. Shared Resources vs Dedicated Resources • Shared resources refer to devices or information on a computer that can be shared or accessed by many users; eg. Accessing folders, files, printers, scanner, emails and others. • Dedicated resources refer to a direct connection between a terminal and a service, network or computer to the specific use of a speticular user.

  5. Unethical Behavior • Using shared resources irresponsibly such as : • Downloading pirated software • Printing a lot of personal files • Storing files that have nothing to do with work such as personal photo files in the shared storage • Causing interference or obstruction to the others access to network resources such as the use of network bandwidth for downloading large files during the working hours • Using shared resources to do thing that cause impairment such as sending spam e-mails to customers

  6. Implications of Violating The Use of Shared Resources • Breach of security • The bandwidth can be congested or overwhelmed • Increased software piracy

  7. How To Permanently Erase Data From Your Old Computer? • First, dismantle the computer or laptop • Second, take out the hard drive • Finally, physically destroy the hard drive

More Related