SlideShare a Scribd company logo
1 of 8
*THE GAP BETWEEN EDUCATED AND
UNEDUCATED,
ECONOMIC CLASSES AND GLOBAL CLASS
*SKILLED AND NON SKILLED PEOPLE











1. RESOLVING THE DIGITAL DEVIDE DEMANDS A NATIONAL
INITIATIVE
2. COMMUNITY RELEVANCE AND COMMUNITY
INVOLVEMENT
3.RETHINK EDUCATIONAL APPROACHES
4. CONTINUE AND EXPAND GOVERNMENT PROGRAMS AND
PROVIDE ADDITIONAL FUNDING TO RESOLVE THE DIGITAL
DIVIDE
5. RETHINK MARKET APPROACHES
6.MORE RESEARCH, DATA COLLECTION AND EVALUATION
7. BETTER TECHNOLOGY AND MORE MINORITY OWNED
BUSINESSES.
BY “THE NET WORKING AND INFORMATION TECHNOLOGY
RESEARCH AND DEVELOPMENT”
<http://www.nitrd.gov/PUBS/pitac/digital_divide/pres2feb00ddlresc.aspx>
CYBER RELATED CRIME
OR INTERNET RELATED CRIMES DEPEND ON THE SCOPE OF
THE CRIME. SO CYBER RELATED SCOPE WISE CRIME IS CYBER
RELATED CRIMES. IT COULD BE LOCAL, STATE WISE, FEDERAL
AND INTERNATIONAL. FOR EXAMPLE:
*COMPUTER INTRUSION I.E. HACKING
*PASSWORD TRAFFICKING
*COUNTERFEITING OF CURRENCY
*CHILD EXPLOITATION AND INTERNET FRAUD
*SPAM AND HARASSMENT
*BOMB THREAT IN INTERNET
www.justice.gov/criminal/cybercrime/reporting.html by THE
UNITED STATES DEPARTMENT OF JUSTICE





Hacker means a clever programmer who break into
computer information or systems or software that means
stealing information from computer. They are spying on
people, government. They are too selfish that they may
crash a system and claim that they do nothing intentionally.
They can freeload all secured information which they
should not.
 Cracker
The bad boy who tries to break the line of systems security
for special codes destroy vital data.
Hacker are interested in the hidden and obscure parts of a
computer or operating system. Hackers actually find the
weak point in the security systems and keeps the owner in
continuous check up. They are looking for knowledge(more
in my video)


http://lerablog.org/technology/the-difference-between-cracker-and-hacker by LERA BLOG









1. Do not do any harm. Do not damage computer or data.
Most of the time they stay funny, many people experience
them.
2. They do not alter or destroy any data as the crackers.
They want to explore the system and learn more. So they
have a thirst for knowledge. Hacker thinks hacking is
harmless but to fix it victims need to spend their valuable
times and efforts. Hackers do not want to waste anything.
3. keep a low profile
4. if suspected and accused then deny it.
5. they like free flow of information
6. sharing








ACCORDING TO U.S. FEDERAL BUREAU OF
INVESTIGATION, CYBER TERRORISM IS ANY POLITICALLY
MOTIVATED ATTACK AGAINST INFORMATION, COMPUTER
SYSTEMS, COMPUTER PROGRAMS, DATA WHICH RESULTS
IN VIOLENCE AGAINST NON- COMBATANT TARGETS.
THE OBJECT OF CYBER TERRORISM IS HARMING OTHER
PEOPLE FINANCIALLY, PHYSICALLY.
TARGET OF CYBER TERRORISM IS THE BANKING
INDUSTRY, MILITARY INSTALLATIONS, POWER
PLANTS, AIR TRAFFIC CONTROL CENTERS OR ANY
SOCIETAL SYSTEMS.
HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/CYBERTERRORISM BY
ROUSE MARGARET IN “CYBERTERRORISM”







IT IS THE STRUGGLE OVER THE INFORMATION AND
COMMUNICATION PROCESS. INFORMATION WARFARE IS
THE APPLICATION OF DESTRUCTIVE FORCE ON A LARGE
SCALE AGAINST INFORMATION ASSETS AND SYSTEMS
AGAINST THE COMPUTERS AND NETWORKS THAT
SUPPORT THE FOUR CRITICAL INFRASTRUCTURES:
THE POWER GRID
COMMUNICATIONS
FINANCIAL
TRANSPORTATION.

http://www.fas.org/irp/eprint/snyder/infowarfare.html. INFORMATION WARFARE BY BRIAN
C. LEWIS









INFORMATION WARFARE PROHIBITS ENEMIES TO ASSURE
THE INTEGRITY, AVALIBILITY AND INTEROPERABILITY OF
FRIENDLY INFORMATION ASSETS BY NDU. SO WE HAVE TO
CONTROL INFORMATION FOR POSSIBLE TERRORISM.
INFORMATION MUST BE DEFENDED AGAINST THEFT,
MODIFICATION AND DESTRUCTION. INFORMATION MUST
BE VERIFIED AFTER RECEIVING. INFORMATION MUST BE
PROTECTED AND TRUSTED AT ALL LEVELS. DISTRIBUTION
OF INFORMATION MUST BE SECURED. WE HAVE TO TRY
TO KNOW THE ENEMIES INFORMATION AND TRY TO
AFFECT THE ROOT OF THE THINKING OF THE ENEMIES
AND AFFECT THAT.
CYBERWAR MAINLY CORRELATED WITH MILITARY
REALM.
(DESCRIPTIONS IN MY VIDEOS IN THE EMAIL)

More Related Content

What's hot

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 

What's hot (20)

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 

Viewers also liked

פרוספקט של חברת פרפקטו פלור
פרוספקט של חברת פרפקטו פלורפרוספקט של חברת פרפקטו פלור
פרוספקט של חברת פרפקטו פלורperfectofloor
 
Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013Wilis Budiarsy
 
The numbers and colors
The numbers and colorsThe numbers and colors
The numbers and colorsLaura Sandoval
 
My story powerpoint
My story powerpoint My story powerpoint
My story powerpoint Paul Ruales
 
Vocabulary skills In Linguistics!!
Vocabulary skills In Linguistics!! Vocabulary skills In Linguistics!!
Vocabulary skills In Linguistics!! Arifa Abid
 
The Reading Skill in Linguistics!!!!!
The Reading Skill in Linguistics!!!!!The Reading Skill in Linguistics!!!!!
The Reading Skill in Linguistics!!!!!Arifa Abid
 
"Domestic Violence"
"Domestic Violence""Domestic Violence"
"Domestic Violence"Arifa Abid
 

Viewers also liked (13)

פרוספקט של חברת פרפקטו פלור
פרוספקט של חברת פרפקטו פלורפרוספקט של חברת פרפקטו פלור
פרוספקט של חברת פרפקטו פלור
 
Presentation
PresentationPresentation
Presentation
 
Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013
 
Loveislife
LoveislifeLoveislife
Loveislife
 
Rigging systems
Rigging systemsRigging systems
Rigging systems
 
İzmir
İzmirİzmir
İzmir
 
Hand tools
Hand toolsHand tools
Hand tools
 
The numbers and colors
The numbers and colorsThe numbers and colors
The numbers and colors
 
My story powerpoint
My story powerpoint My story powerpoint
My story powerpoint
 
Coiling Cables
Coiling CablesCoiling Cables
Coiling Cables
 
Vocabulary skills In Linguistics!!
Vocabulary skills In Linguistics!! Vocabulary skills In Linguistics!!
Vocabulary skills In Linguistics!!
 
The Reading Skill in Linguistics!!!!!
The Reading Skill in Linguistics!!!!!The Reading Skill in Linguistics!!!!!
The Reading Skill in Linguistics!!!!!
 
"Domestic Violence"
"Domestic Violence""Domestic Violence"
"Domestic Violence"
 

Similar to Digital divide final ppt

The Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxThe Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxCarloCimacio
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Social Media in the Philippines.pptx
Social Media in the Philippines.pptxSocial Media in the Philippines.pptx
Social Media in the Philippines.pptxChristianneVentura
 
Social engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptxSocial engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptxWaridah Makena
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper HellerKyle Heller
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
 
Business law assignment
Business law assignmentBusiness law assignment
Business law assignmentSriAthi
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 

Similar to Digital divide final ppt (20)

COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
The Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxThe Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptx
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Social Media in the Philippines.pptx
Social Media in the Philippines.pptxSocial Media in the Philippines.pptx
Social Media in the Philippines.pptx
 
Social engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptxSocial engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptx
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
Business law assignment
Business law assignmentBusiness law assignment
Business law assignment
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Digital divide final ppt

  • 1. *THE GAP BETWEEN EDUCATED AND UNEDUCATED, ECONOMIC CLASSES AND GLOBAL CLASS *SKILLED AND NON SKILLED PEOPLE
  • 2.          1. RESOLVING THE DIGITAL DEVIDE DEMANDS A NATIONAL INITIATIVE 2. COMMUNITY RELEVANCE AND COMMUNITY INVOLVEMENT 3.RETHINK EDUCATIONAL APPROACHES 4. CONTINUE AND EXPAND GOVERNMENT PROGRAMS AND PROVIDE ADDITIONAL FUNDING TO RESOLVE THE DIGITAL DIVIDE 5. RETHINK MARKET APPROACHES 6.MORE RESEARCH, DATA COLLECTION AND EVALUATION 7. BETTER TECHNOLOGY AND MORE MINORITY OWNED BUSINESSES. BY “THE NET WORKING AND INFORMATION TECHNOLOGY RESEARCH AND DEVELOPMENT” <http://www.nitrd.gov/PUBS/pitac/digital_divide/pres2feb00ddlresc.aspx>
  • 3. CYBER RELATED CRIME OR INTERNET RELATED CRIMES DEPEND ON THE SCOPE OF THE CRIME. SO CYBER RELATED SCOPE WISE CRIME IS CYBER RELATED CRIMES. IT COULD BE LOCAL, STATE WISE, FEDERAL AND INTERNATIONAL. FOR EXAMPLE: *COMPUTER INTRUSION I.E. HACKING *PASSWORD TRAFFICKING *COUNTERFEITING OF CURRENCY *CHILD EXPLOITATION AND INTERNET FRAUD *SPAM AND HARASSMENT *BOMB THREAT IN INTERNET www.justice.gov/criminal/cybercrime/reporting.html by THE UNITED STATES DEPARTMENT OF JUSTICE
  • 4.    Hacker means a clever programmer who break into computer information or systems or software that means stealing information from computer. They are spying on people, government. They are too selfish that they may crash a system and claim that they do nothing intentionally. They can freeload all secured information which they should not.  Cracker The bad boy who tries to break the line of systems security for special codes destroy vital data. Hacker are interested in the hidden and obscure parts of a computer or operating system. Hackers actually find the weak point in the security systems and keeps the owner in continuous check up. They are looking for knowledge(more in my video)  http://lerablog.org/technology/the-difference-between-cracker-and-hacker by LERA BLOG
  • 5.       1. Do not do any harm. Do not damage computer or data. Most of the time they stay funny, many people experience them. 2. They do not alter or destroy any data as the crackers. They want to explore the system and learn more. So they have a thirst for knowledge. Hacker thinks hacking is harmless but to fix it victims need to spend their valuable times and efforts. Hackers do not want to waste anything. 3. keep a low profile 4. if suspected and accused then deny it. 5. they like free flow of information 6. sharing
  • 6.     ACCORDING TO U.S. FEDERAL BUREAU OF INVESTIGATION, CYBER TERRORISM IS ANY POLITICALLY MOTIVATED ATTACK AGAINST INFORMATION, COMPUTER SYSTEMS, COMPUTER PROGRAMS, DATA WHICH RESULTS IN VIOLENCE AGAINST NON- COMBATANT TARGETS. THE OBJECT OF CYBER TERRORISM IS HARMING OTHER PEOPLE FINANCIALLY, PHYSICALLY. TARGET OF CYBER TERRORISM IS THE BANKING INDUSTRY, MILITARY INSTALLATIONS, POWER PLANTS, AIR TRAFFIC CONTROL CENTERS OR ANY SOCIETAL SYSTEMS. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/CYBERTERRORISM BY ROUSE MARGARET IN “CYBERTERRORISM”
  • 7.      IT IS THE STRUGGLE OVER THE INFORMATION AND COMMUNICATION PROCESS. INFORMATION WARFARE IS THE APPLICATION OF DESTRUCTIVE FORCE ON A LARGE SCALE AGAINST INFORMATION ASSETS AND SYSTEMS AGAINST THE COMPUTERS AND NETWORKS THAT SUPPORT THE FOUR CRITICAL INFRASTRUCTURES: THE POWER GRID COMMUNICATIONS FINANCIAL TRANSPORTATION. http://www.fas.org/irp/eprint/snyder/infowarfare.html. INFORMATION WARFARE BY BRIAN C. LEWIS
  • 8.      INFORMATION WARFARE PROHIBITS ENEMIES TO ASSURE THE INTEGRITY, AVALIBILITY AND INTEROPERABILITY OF FRIENDLY INFORMATION ASSETS BY NDU. SO WE HAVE TO CONTROL INFORMATION FOR POSSIBLE TERRORISM. INFORMATION MUST BE DEFENDED AGAINST THEFT, MODIFICATION AND DESTRUCTION. INFORMATION MUST BE VERIFIED AFTER RECEIVING. INFORMATION MUST BE PROTECTED AND TRUSTED AT ALL LEVELS. DISTRIBUTION OF INFORMATION MUST BE SECURED. WE HAVE TO TRY TO KNOW THE ENEMIES INFORMATION AND TRY TO AFFECT THE ROOT OF THE THINKING OF THE ENEMIES AND AFFECT THAT. CYBERWAR MAINLY CORRELATED WITH MILITARY REALM. (DESCRIPTIONS IN MY VIDEOS IN THE EMAIL)