SlideShare a Scribd company logo
1 of 11
Download to read offline
INTERNET ISSUES
Samir Char
Camila Abiad
Maria Juliana Morales
INTRODUCTION
The Internet links are computer networks all over the world so
that users can share resources and communicate with each
other. The Internet is an inherently participative medium.
Anybody can publish information or create new services that´s
why it is a fantastic resource for finding and sharing
information. The Web contains literally billions of web pages
containing information about every topic imaginable.
However we need to take care when using the Internet to look
for information, or to send information.
RELIABILITY OF INFORMATION
The Internet and Web are not regulated - there is no organisation that controls who can
create web pages or what those pages can contain.
So... how do you which web pages to believe, which information to trust?

 Stick to websites that belong to trusted organisations. If the website address ends in
  .gov.uk it is more likely to be reliable than one that ends in .com
 Look at the spelling and grammar used.
 Who is the author or sponsor of the page?
 Are there obvious reasons for bias?
 Is contact information provided?
 Is there a copyright symbol on the page? If so, who holds the copyright?
 Is this page a "zombie," or one considered "walking dead" because the person who
  posted it no longer maintains or updates it?
 What is the purpose of the page? Why is this information being posted--as
  information, as a public service, as a news source, as a research tool for academics, as
  a personal ax to grind, or as a way to gain attention?
 How well organized is the page? Is the page easy to navigate? Is it complete? When
  was the page last updated? Is the information on it current? How credible are the links it
  provides?
 Can you verify the information on the Web page some other way?
 Even though a page might not meet your standards as a citable source, it may
  help you generate good ideas.
UNDESIRABLE INFORMATION
In addition to the Web being full of websites with inaccurate
information, there are also a huge number of websites that
contain highly offensive, or illegal material.

Avoiding this type of material can be tricky. Many organisations
and also many parents, make use of web page filtering
software. This software attempts to prevent offensive and illegal
material being accessed.

Even if filtering software is not installed on a computer, you can
still take steps to help you avoid these types of sites:
Use the 'safe search' feature on search engines such as Google.
 Don’t click the links that are shown in junk email (spam)
 Think carefully about the keywords that you use to search with.
SECURITY OF DATA TRANSFER
USING INTERNET
As has been discussed already, you should always consider
encrypting any sensitive or personal data that is sent or
accessed over a public network such as The Internet.

Many websites, especially online shopping or online
banking sites, require you to enter personal information, such
as credit card numbers, social security IDs, etc. To make
sure your data is safe, these websites use encryption - they
are called secure websites.

You should always make sure that a website is secure before
giving personal information...
The website URL (address) should begin with https://...
(normal, unsecure sites have addresses that start with http://...)
 Your web browser should show a closed padlock icon
PHISING
'Phishing' is the nickname given to the sending of fraudulent e-
mails that attempt to trick people into revealing details about
their bank accounts, or other online accounts (e.g.
Amazon, eBay, etc.)

The 'phishers' then use these bank details to login to the
victim's bank account and take their money.
The e-mail looks very convincing. It even has the bank's logo.
And it sounds urgent and scary...
If you were to click the link, you would be taken to a fake bank
website. Then if you were to enter your login details, these
would be recorded by the phishers and used to empty your
real bank account.
PHARMING
'Pharming' is similar to phishing, but instead of deceiving you (as
phishing does), a pharming attack deceives your computer.

In a pharming attack, when you type in a completely genuine URL
(e.g. for your online banking website), your computer is tricked
into displaying a fake website (often a very accurate copy).

Then, when you try to login to the fake website, your username /
password are recorded and used to take money from your real
bank account.

It is very difficult to spot pharming attacks, because to the user
everything seems to be normal.
E-MAIL SPAM
'Spam' is the name given to unsolicited e-mails (ones sent without being asked for). It is
a huge problem. It is estimated that 97% of all e-mail messages sent is spam.

The most commonly seen spam includes the following:
 Phishing scams, a very popular and dangerous form of email fraud
 Foreign bank scams or advance fee fraud schemes
 Pyramid schemes, including multilevel marketing (MLM)
 Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes
 Quack health products and remedies
 Ads for pornographic web sites
 Offers of software for collecting email addresses and sending UCE
 Offers of bulk emailing services for sending UCE
 Chain letters Illegally pirated software
  Spam e-mails usually contain adverts for products.

If it wasn't for e-mail spam filters (which separate out spam messages from genuine
messages) our e-mail systems would be unusable.
CONCLUSION
 As technology evolves so does computers, internet, and
  hacking programs and methods. Terrorists and thieves now
  can attack via internet to individual users and even entire
  governments, generating fear, which develops in terror and
  creates conflicts. Methods such as pharming, phishing and
  E-Mail spamming are often used by hackers in order to get
  money or information from internet users. In this presentation
  we are going to make you aware of all this types of internet
  attacks, in order to keep security.

More Related Content

What's hot

What is internet
What is internetWhat is internet
What is internetcramars
 
Search Engines & Web Browser & Internet & World wide Web (WWW)
Search Engines & Web Browser & Internet & World wide Web (WWW)Search Engines & Web Browser & Internet & World wide Web (WWW)
Search Engines & Web Browser & Internet & World wide Web (WWW)ShaharyarShoukatShou
 
Url Presentation
Url PresentationUrl Presentation
Url Presentationsanniii
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & WebpageZeeshan Alam
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
WWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEWWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEruledbyrobotics2080
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.pptgasumova
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
Presentation on web browser
Presentation on web browserPresentation on web browser
Presentation on web browserSwasat Dutta
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Introduction of multimedia in education
Introduction of multimedia in educationIntroduction of multimedia in education
Introduction of multimedia in educationUPSIcoursework
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 

What's hot (20)

What is internet
What is internetWhat is internet
What is internet
 
Search Engines & Web Browser & Internet & World wide Web (WWW)
Search Engines & Web Browser & Internet & World wide Web (WWW)Search Engines & Web Browser & Internet & World wide Web (WWW)
Search Engines & Web Browser & Internet & World wide Web (WWW)
 
Url Presentation
Url PresentationUrl Presentation
Url Presentation
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
WWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEWWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINE
 
Internet and Social Media
Internet and Social MediaInternet and Social Media
Internet and Social Media
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Web browser
Web browserWeb browser
Web browser
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
 
Internet
InternetInternet
Internet
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Presentation on web browser
Presentation on web browserPresentation on web browser
Presentation on web browser
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Introduction of multimedia in education
Introduction of multimedia in educationIntroduction of multimedia in education
Introduction of multimedia in education
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Using the Internet for Learning
Using the Internet for LearningUsing the Internet for Learning
Using the Internet for Learning
 

Similar to Internet Issues Guide

Similar to Internet Issues Guide (20)

Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Internet Use Issues.pptx
Internet Use Issues.pptxInternet Use Issues.pptx
Internet Use Issues.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Phishing
PhishingPhishing
Phishing
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 

Recently uploaded (20)

Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 

Internet Issues Guide

  • 1. INTERNET ISSUES Samir Char Camila Abiad Maria Juliana Morales
  • 2. INTRODUCTION The Internet links are computer networks all over the world so that users can share resources and communicate with each other. The Internet is an inherently participative medium. Anybody can publish information or create new services that´s why it is a fantastic resource for finding and sharing information. The Web contains literally billions of web pages containing information about every topic imaginable. However we need to take care when using the Internet to look for information, or to send information.
  • 3. RELIABILITY OF INFORMATION The Internet and Web are not regulated - there is no organisation that controls who can create web pages or what those pages can contain. So... how do you which web pages to believe, which information to trust?  Stick to websites that belong to trusted organisations. If the website address ends in .gov.uk it is more likely to be reliable than one that ends in .com  Look at the spelling and grammar used.  Who is the author or sponsor of the page?  Are there obvious reasons for bias?  Is contact information provided?  Is there a copyright symbol on the page? If so, who holds the copyright?  Is this page a "zombie," or one considered "walking dead" because the person who posted it no longer maintains or updates it?  What is the purpose of the page? Why is this information being posted--as information, as a public service, as a news source, as a research tool for academics, as a personal ax to grind, or as a way to gain attention?  How well organized is the page? Is the page easy to navigate? Is it complete? When was the page last updated? Is the information on it current? How credible are the links it provides?  Can you verify the information on the Web page some other way?  Even though a page might not meet your standards as a citable source, it may help you generate good ideas.
  • 4.
  • 5. UNDESIRABLE INFORMATION In addition to the Web being full of websites with inaccurate information, there are also a huge number of websites that contain highly offensive, or illegal material. Avoiding this type of material can be tricky. Many organisations and also many parents, make use of web page filtering software. This software attempts to prevent offensive and illegal material being accessed. Even if filtering software is not installed on a computer, you can still take steps to help you avoid these types of sites: Use the 'safe search' feature on search engines such as Google.  Don’t click the links that are shown in junk email (spam)  Think carefully about the keywords that you use to search with.
  • 6. SECURITY OF DATA TRANSFER USING INTERNET As has been discussed already, you should always consider encrypting any sensitive or personal data that is sent or accessed over a public network such as The Internet. Many websites, especially online shopping or online banking sites, require you to enter personal information, such as credit card numbers, social security IDs, etc. To make sure your data is safe, these websites use encryption - they are called secure websites. You should always make sure that a website is secure before giving personal information... The website URL (address) should begin with https://... (normal, unsecure sites have addresses that start with http://...)  Your web browser should show a closed padlock icon
  • 7. PHISING 'Phishing' is the nickname given to the sending of fraudulent e- mails that attempt to trick people into revealing details about their bank accounts, or other online accounts (e.g. Amazon, eBay, etc.) The 'phishers' then use these bank details to login to the victim's bank account and take their money. The e-mail looks very convincing. It even has the bank's logo. And it sounds urgent and scary... If you were to click the link, you would be taken to a fake bank website. Then if you were to enter your login details, these would be recorded by the phishers and used to empty your real bank account.
  • 8.
  • 9. PHARMING 'Pharming' is similar to phishing, but instead of deceiving you (as phishing does), a pharming attack deceives your computer. In a pharming attack, when you type in a completely genuine URL (e.g. for your online banking website), your computer is tricked into displaying a fake website (often a very accurate copy). Then, when you try to login to the fake website, your username / password are recorded and used to take money from your real bank account. It is very difficult to spot pharming attacks, because to the user everything seems to be normal.
  • 10. E-MAIL SPAM 'Spam' is the name given to unsolicited e-mails (ones sent without being asked for). It is a huge problem. It is estimated that 97% of all e-mail messages sent is spam. The most commonly seen spam includes the following:  Phishing scams, a very popular and dangerous form of email fraud  Foreign bank scams or advance fee fraud schemes  Pyramid schemes, including multilevel marketing (MLM)  Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes  Quack health products and remedies  Ads for pornographic web sites  Offers of software for collecting email addresses and sending UCE  Offers of bulk emailing services for sending UCE  Chain letters Illegally pirated software Spam e-mails usually contain adverts for products. If it wasn't for e-mail spam filters (which separate out spam messages from genuine messages) our e-mail systems would be unusable.
  • 11. CONCLUSION  As technology evolves so does computers, internet, and hacking programs and methods. Terrorists and thieves now can attack via internet to individual users and even entire governments, generating fear, which develops in terror and creates conflicts. Methods such as pharming, phishing and E-Mail spamming are often used by hackers in order to get money or information from internet users. In this presentation we are going to make you aware of all this types of internet attacks, in order to keep security.