Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Digital divide final ppt

507 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Digital divide final ppt

  1. 1. *THE GAP BETWEEN EDUCATED AND UNEDUCATED, ECONOMIC CLASSES AND GLOBAL CLASS *SKILLED AND NON SKILLED PEOPLE
  2. 2.          1. RESOLVING THE DIGITAL DEVIDE DEMANDS A NATIONAL INITIATIVE 2. COMMUNITY RELEVANCE AND COMMUNITY INVOLVEMENT 3.RETHINK EDUCATIONAL APPROACHES 4. CONTINUE AND EXPAND GOVERNMENT PROGRAMS AND PROVIDE ADDITIONAL FUNDING TO RESOLVE THE DIGITAL DIVIDE 5. RETHINK MARKET APPROACHES 6.MORE RESEARCH, DATA COLLECTION AND EVALUATION 7. BETTER TECHNOLOGY AND MORE MINORITY OWNED BUSINESSES. BY “THE NET WORKING AND INFORMATION TECHNOLOGY RESEARCH AND DEVELOPMENT” <http://www.nitrd.gov/PUBS/pitac/digital_divide/pres2feb00ddlresc.aspx>
  3. 3. CYBER RELATED CRIME OR INTERNET RELATED CRIMES DEPEND ON THE SCOPE OF THE CRIME. SO CYBER RELATED SCOPE WISE CRIME IS CYBER RELATED CRIMES. IT COULD BE LOCAL, STATE WISE, FEDERAL AND INTERNATIONAL. FOR EXAMPLE: *COMPUTER INTRUSION I.E. HACKING *PASSWORD TRAFFICKING *COUNTERFEITING OF CURRENCY *CHILD EXPLOITATION AND INTERNET FRAUD *SPAM AND HARASSMENT *BOMB THREAT IN INTERNET www.justice.gov/criminal/cybercrime/reporting.html by THE UNITED STATES DEPARTMENT OF JUSTICE
  4. 4.    Hacker means a clever programmer who break into computer information or systems or software that means stealing information from computer. They are spying on people, government. They are too selfish that they may crash a system and claim that they do nothing intentionally. They can freeload all secured information which they should not.  Cracker The bad boy who tries to break the line of systems security for special codes destroy vital data. Hacker are interested in the hidden and obscure parts of a computer or operating system. Hackers actually find the weak point in the security systems and keeps the owner in continuous check up. They are looking for knowledge(more in my video)  http://lerablog.org/technology/the-difference-between-cracker-and-hacker by LERA BLOG
  5. 5.       1. Do not do any harm. Do not damage computer or data. Most of the time they stay funny, many people experience them. 2. They do not alter or destroy any data as the crackers. They want to explore the system and learn more. So they have a thirst for knowledge. Hacker thinks hacking is harmless but to fix it victims need to spend their valuable times and efforts. Hackers do not want to waste anything. 3. keep a low profile 4. if suspected and accused then deny it. 5. they like free flow of information 6. sharing
  6. 6.     ACCORDING TO U.S. FEDERAL BUREAU OF INVESTIGATION, CYBER TERRORISM IS ANY POLITICALLY MOTIVATED ATTACK AGAINST INFORMATION, COMPUTER SYSTEMS, COMPUTER PROGRAMS, DATA WHICH RESULTS IN VIOLENCE AGAINST NON- COMBATANT TARGETS. THE OBJECT OF CYBER TERRORISM IS HARMING OTHER PEOPLE FINANCIALLY, PHYSICALLY. TARGET OF CYBER TERRORISM IS THE BANKING INDUSTRY, MILITARY INSTALLATIONS, POWER PLANTS, AIR TRAFFIC CONTROL CENTERS OR ANY SOCIETAL SYSTEMS. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/CYBERTERRORISM BY ROUSE MARGARET IN “CYBERTERRORISM”
  7. 7.      IT IS THE STRUGGLE OVER THE INFORMATION AND COMMUNICATION PROCESS. INFORMATION WARFARE IS THE APPLICATION OF DESTRUCTIVE FORCE ON A LARGE SCALE AGAINST INFORMATION ASSETS AND SYSTEMS AGAINST THE COMPUTERS AND NETWORKS THAT SUPPORT THE FOUR CRITICAL INFRASTRUCTURES: THE POWER GRID COMMUNICATIONS FINANCIAL TRANSPORTATION. http://www.fas.org/irp/eprint/snyder/infowarfare.html. INFORMATION WARFARE BY BRIAN C. LEWIS
  8. 8.      INFORMATION WARFARE PROHIBITS ENEMIES TO ASSURE THE INTEGRITY, AVALIBILITY AND INTEROPERABILITY OF FRIENDLY INFORMATION ASSETS BY NDU. SO WE HAVE TO CONTROL INFORMATION FOR POSSIBLE TERRORISM. INFORMATION MUST BE DEFENDED AGAINST THEFT, MODIFICATION AND DESTRUCTION. INFORMATION MUST BE VERIFIED AFTER RECEIVING. INFORMATION MUST BE PROTECTED AND TRUSTED AT ALL LEVELS. DISTRIBUTION OF INFORMATION MUST BE SECURED. WE HAVE TO TRY TO KNOW THE ENEMIES INFORMATION AND TRY TO AFFECT THE ROOT OF THE THINKING OF THE ENEMIES AND AFFECT THAT. CYBERWAR MAINLY CORRELATED WITH MILITARY REALM. (DESCRIPTIONS IN MY VIDEOS IN THE EMAIL)

×