Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ao4 powerpoint mrs hussain


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Ao4 powerpoint mrs hussain

  1. 1. AO4 – Implications and Security Issues of the Internet Unit 24:- Internet Past, Present and Future
  2. 2. Introduction• Moral/ethical issues• Social implications• Commercial
  3. 3. Moral/ethical issuesPornographyChat rooms
  4. 4. PornographyHas a number of negative effects on individuals and society. Research has shown pornography has potential influencessuch as rape, domestic violence and sexual dysfunction.Viewing of pornographic material may increase rates ofsexual crimes.Child pornography is a growing concern and can havedevastating effects.
  5. 5. Chat rooms Sexual - Opens the doors to sexual predators - Used to share illegal and pornographic substances such aschild pornography. Cyber bullying- Internet provides anonymity for those wishing to harass, insultor stalk others.- Easy to become a victim of cyber bullying throughFacebook, message boards etc. False identity- Accounts can be created in seconds with false identities, profilesand email addresses.
  6. 6. Social implicationsIncreased addictionChanges in working practices
  7. 7. Increased addictionInternet addiction disorderExcessive computer use interferes with daily life.Shopping and gambling25% of users fulfil the internet addiction criteria within thefirst 6 months of first using the internet.
  8. 8. Changes in working practisesMore people now work from homeInternet provides 24/7 access to work
  9. 9. Commercial24 hour shoppingAdvertising
  10. 10. 24 Hour shoppingOnline deliveriesImproved securityEasy methods of paying onlineData tracking services
  11. 11. AdvertisingOnline advertising is very popular and has grown hugelyInteractive advertisementsEmailSearch engine result pages
  12. 12. Security risksViruses, Trojans, Worms, Spyware, MalwareHackersPhishingIdentity theftEmail attachments
  13. 13. Viruses, Trojans, Worms, Spyware, Malwa reVirus is a program which copies itself and infects a PCTrojans are programs which pretend to be another program orsomething else. They can delete files on a computer.A worm replicates itself in order to spread to othercomputers.Spyware and Malware are often installed onto a computerwithout the users knowledge.
  14. 14. HackersA computer hacker is an individual who finds weaknesseswithin a computer system and exploits them.It can be authorized or unauthorized.Hackers are today commonly associated with maliciousprogramming attacks on the internet.
  15. 15. PhishingAn attack where you are sent an email or phone call whichasks you to click on a link and re enter your bank or creditcard details.They pretend to be from banks, online stores and serviceproviders.They appear genuine when in reality they are a fraud and willsteal your details using them to their own advantage.
  16. 16. Identity theftIdentity theft is a form of stealing someone else’s identity. Made easy due to the internet as people reveal personalinformation on the internet about themselves.If someone is able to access someone else’s personalinformation they can commit fraud under their name.
  17. 17. Email attachmentsHold big risks such as spread of malware, trojans andworms.This is because emails contain attachments which maycontain viruses which can infect your computer.This happens once the infected email is opened.
  18. 18. Protection techniquesFire wallsAnti virusCode of practiceEncryptionSecure payment systems
  19. 19. FirewallsA device which is designed to deny access to anyunauthorized programs.Many personal computer operating systems include firewallswhich protect the computer from harm.
  20. 20. Anti virusAnti virus software is used to prevent, detect and removeany sort of malware.Scans computers for virusesIt is important that anti virus softwares are updatedregularly.
  21. 21. EncryptionTranslation of data into a secret codeIn order to read encrypted data you must have access to asecret key or a password.This can be used with important files. So if hackers were toget hold of the files they would not understand or be able toread the file without the password or key.
  22. 22. Secure payment systemsWith secure payment systems customers are reassured thattheir payments are secure.Several methods have been introduced which makepayments secure.SSL, HTTPS, PayPal