SlideShare a Scribd company logo
INTERNET ISSUES
Samir Char
Camila Abiad
Maria Juliana Morales
INTRODUCTION
The Internet links are computer networks all over the world so
that users can share resources and communicate with each
other. The Internet is an inherently participative medium.
Anybody can publish information or create new services that´s
why it is a fantastic resource for finding and sharing
information. The Web contains literally billions of web pages
containing information about every topic imaginable.
However we need to take care when using the Internet to look
for information, or to send information.
RELIABILITY OF INFORMATION
The Internet and Web are not regulated - there is no organisation that controls who can
create web pages or what those pages can contain.
So... how do you which web pages to believe, which information to trust?

 Stick to websites that belong to trusted organisations. If the website address ends in
  .gov.uk it is more likely to be reliable than one that ends in .com
 Look at the spelling and grammar used.
 Who is the author or sponsor of the page?
 Are there obvious reasons for bias?
 Is contact information provided?
 Is there a copyright symbol on the page? If so, who holds the copyright?
 Is this page a "zombie," or one considered "walking dead" because the person who
  posted it no longer maintains or updates it?
 What is the purpose of the page? Why is this information being posted--as
  information, as a public service, as a news source, as a research tool for academics, as
  a personal ax to grind, or as a way to gain attention?
 How well organized is the page? Is the page easy to navigate? Is it complete? When
  was the page last updated? Is the information on it current? How credible are the links it
  provides?
 Can you verify the information on the Web page some other way?
 Even though a page might not meet your standards as a citable source, it may
  help you generate good ideas.
UNDESIRABLE INFORMATION
In addition to the Web being full of websites with inaccurate
information, there are also a huge number of websites that
contain highly offensive, or illegal material.

Avoiding this type of material can be tricky. Many organisations
and also many parents, make use of web page filtering
software. This software attempts to prevent offensive and illegal
material being accessed.

Even if filtering software is not installed on a computer, you can
still take steps to help you avoid these types of sites:
Use the 'safe search' feature on search engines such as Google.
 Don’t click the links that are shown in junk email (spam)
 Think carefully about the keywords that you use to search with.
SECURITY OF DATA TRANSFER
USING INTERNET
As has been discussed already, you should always consider
encrypting any sensitive or personal data that is sent or
accessed over a public network such as The Internet.

Many websites, especially online shopping or online
banking sites, require you to enter personal information, such
as credit card numbers, social security IDs, etc. To make
sure your data is safe, these websites use encryption - they
are called secure websites.

You should always make sure that a website is secure before
giving personal information...
The website URL (address) should begin with https://...
(normal, unsecure sites have addresses that start with http://...)
 Your web browser should show a closed padlock icon
PHISING
'Phishing' is the nickname given to the sending of fraudulent e-
mails that attempt to trick people into revealing details about
their bank accounts, or other online accounts (e.g.
Amazon, eBay, etc.)

The 'phishers' then use these bank details to login to the
victim's bank account and take their money.
The e-mail looks very convincing. It even has the bank's logo.
And it sounds urgent and scary...
If you were to click the link, you would be taken to a fake bank
website. Then if you were to enter your login details, these
would be recorded by the phishers and used to empty your
real bank account.
PHARMING
'Pharming' is similar to phishing, but instead of deceiving you (as
phishing does), a pharming attack deceives your computer.

In a pharming attack, when you type in a completely genuine URL
(e.g. for your online banking website), your computer is tricked
into displaying a fake website (often a very accurate copy).

Then, when you try to login to the fake website, your username /
password are recorded and used to take money from your real
bank account.

It is very difficult to spot pharming attacks, because to the user
everything seems to be normal.
E-MAIL SPAM
'Spam' is the name given to unsolicited e-mails (ones sent without being asked for). It is
a huge problem. It is estimated that 97% of all e-mail messages sent is spam.

The most commonly seen spam includes the following:
 Phishing scams, a very popular and dangerous form of email fraud
 Foreign bank scams or advance fee fraud schemes
 Pyramid schemes, including multilevel marketing (MLM)
 Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes
 Quack health products and remedies
 Ads for pornographic web sites
 Offers of software for collecting email addresses and sending UCE
 Offers of bulk emailing services for sending UCE
 Chain letters Illegally pirated software
  Spam e-mails usually contain adverts for products.

If it wasn't for e-mail spam filters (which separate out spam messages from genuine
messages) our e-mail systems would be unusable.
CONCLUSION
 As technology evolves so does computers, internet, and
  hacking programs and methods. Terrorists and thieves now
  can attack via internet to individual users and even entire
  governments, generating fear, which develops in terror and
  creates conflicts. Methods such as pharming, phishing and
  E-Mail spamming are often used by hackers in order to get
  money or information from internet users. In this presentation
  we are going to make you aware of all this types of internet
  attacks, in order to keep security.

More Related Content

What's hot

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
social networking sites
social networking sitessocial networking sites
social networking sites
Anant Agarwal
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
The 6 types of social media
The 6 types of social mediaThe 6 types of social media
The 6 types of social media
Tennycut
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
social network
social networksocial network
social network
sweety13696
 
The Internet’s Impact On Society
The Internet’s Impact On SocietyThe Internet’s Impact On Society
The Internet’s Impact On Society
rchuvt
 
Social media
Social mediaSocial media
Social media
erwin marlon sario
 
Social media effects by siraj
Social media effects by sirajSocial media effects by siraj
Social media effects by siraj
Muhammad SiRaj Munir
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
Sai Sreeram
 
Social networks: Advantages and disadvantages
Social networks: Advantages and disadvantagesSocial networks: Advantages and disadvantages
Social networks: Advantages and disadvantages
ntechproject
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
Gab Billones
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
gulsheramjad
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
social media and it's impact to the society
social media and  it's impact to the societysocial media and  it's impact to the society
social media and it's impact to the society
Madushan Sandaruwan
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Social media
Social mediaSocial media
Social media
Carla Ayers
 
Impact of social media
Impact of social mediaImpact of social media
Impact of social media
Snehal Khedkar
 
Web 2.0
Web 2.0 Web 2.0
Web 2.0
Ola Sayed Ahmed
 

What's hot (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
The 6 types of social media
The 6 types of social mediaThe 6 types of social media
The 6 types of social media
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
social network
social networksocial network
social network
 
The Internet’s Impact On Society
The Internet’s Impact On SocietyThe Internet’s Impact On Society
The Internet’s Impact On Society
 
Social media
Social mediaSocial media
Social media
 
Social media effects by siraj
Social media effects by sirajSocial media effects by siraj
Social media effects by siraj
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Social networks: Advantages and disadvantages
Social networks: Advantages and disadvantagesSocial networks: Advantages and disadvantages
Social networks: Advantages and disadvantages
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
social media and it's impact to the society
social media and  it's impact to the societysocial media and  it's impact to the society
social media and it's impact to the society
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Social media
Social mediaSocial media
Social media
 
Impact of social media
Impact of social mediaImpact of social media
Impact of social media
 
Web 2.0
Web 2.0 Web 2.0
Web 2.0
 
Phishing
PhishingPhishing
Phishing
 

Similar to Internet issues

Online secuirty
Online secuirtyOnline secuirty
Online secuirty
Momina Mateen
 
Internet Use Issues.pptx
Internet Use Issues.pptxInternet Use Issues.pptx
Internet Use Issues.pptx
UmarMamasaidov
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
angelosoriano12
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
ejhilbert
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
Wizer - Cyber Security Awareness
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Msmafer23
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Cybercrime
CybercrimeCybercrime

Similar to Internet issues (20)

Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Internet Use Issues.pptx
Internet Use Issues.pptxInternet Use Issues.pptx
Internet Use Issues.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Phishing
PhishingPhishing
Phishing
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 

Internet issues

  • 1. INTERNET ISSUES Samir Char Camila Abiad Maria Juliana Morales
  • 2. INTRODUCTION The Internet links are computer networks all over the world so that users can share resources and communicate with each other. The Internet is an inherently participative medium. Anybody can publish information or create new services that´s why it is a fantastic resource for finding and sharing information. The Web contains literally billions of web pages containing information about every topic imaginable. However we need to take care when using the Internet to look for information, or to send information.
  • 3. RELIABILITY OF INFORMATION The Internet and Web are not regulated - there is no organisation that controls who can create web pages or what those pages can contain. So... how do you which web pages to believe, which information to trust?  Stick to websites that belong to trusted organisations. If the website address ends in .gov.uk it is more likely to be reliable than one that ends in .com  Look at the spelling and grammar used.  Who is the author or sponsor of the page?  Are there obvious reasons for bias?  Is contact information provided?  Is there a copyright symbol on the page? If so, who holds the copyright?  Is this page a "zombie," or one considered "walking dead" because the person who posted it no longer maintains or updates it?  What is the purpose of the page? Why is this information being posted--as information, as a public service, as a news source, as a research tool for academics, as a personal ax to grind, or as a way to gain attention?  How well organized is the page? Is the page easy to navigate? Is it complete? When was the page last updated? Is the information on it current? How credible are the links it provides?  Can you verify the information on the Web page some other way?  Even though a page might not meet your standards as a citable source, it may help you generate good ideas.
  • 4.
  • 5. UNDESIRABLE INFORMATION In addition to the Web being full of websites with inaccurate information, there are also a huge number of websites that contain highly offensive, or illegal material. Avoiding this type of material can be tricky. Many organisations and also many parents, make use of web page filtering software. This software attempts to prevent offensive and illegal material being accessed. Even if filtering software is not installed on a computer, you can still take steps to help you avoid these types of sites: Use the 'safe search' feature on search engines such as Google.  Don’t click the links that are shown in junk email (spam)  Think carefully about the keywords that you use to search with.
  • 6. SECURITY OF DATA TRANSFER USING INTERNET As has been discussed already, you should always consider encrypting any sensitive or personal data that is sent or accessed over a public network such as The Internet. Many websites, especially online shopping or online banking sites, require you to enter personal information, such as credit card numbers, social security IDs, etc. To make sure your data is safe, these websites use encryption - they are called secure websites. You should always make sure that a website is secure before giving personal information... The website URL (address) should begin with https://... (normal, unsecure sites have addresses that start with http://...)  Your web browser should show a closed padlock icon
  • 7. PHISING 'Phishing' is the nickname given to the sending of fraudulent e- mails that attempt to trick people into revealing details about their bank accounts, or other online accounts (e.g. Amazon, eBay, etc.) The 'phishers' then use these bank details to login to the victim's bank account and take their money. The e-mail looks very convincing. It even has the bank's logo. And it sounds urgent and scary... If you were to click the link, you would be taken to a fake bank website. Then if you were to enter your login details, these would be recorded by the phishers and used to empty your real bank account.
  • 8.
  • 9. PHARMING 'Pharming' is similar to phishing, but instead of deceiving you (as phishing does), a pharming attack deceives your computer. In a pharming attack, when you type in a completely genuine URL (e.g. for your online banking website), your computer is tricked into displaying a fake website (often a very accurate copy). Then, when you try to login to the fake website, your username / password are recorded and used to take money from your real bank account. It is very difficult to spot pharming attacks, because to the user everything seems to be normal.
  • 10. E-MAIL SPAM 'Spam' is the name given to unsolicited e-mails (ones sent without being asked for). It is a huge problem. It is estimated that 97% of all e-mail messages sent is spam. The most commonly seen spam includes the following:  Phishing scams, a very popular and dangerous form of email fraud  Foreign bank scams or advance fee fraud schemes  Pyramid schemes, including multilevel marketing (MLM)  Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes  Quack health products and remedies  Ads for pornographic web sites  Offers of software for collecting email addresses and sending UCE  Offers of bulk emailing services for sending UCE  Chain letters Illegally pirated software Spam e-mails usually contain adverts for products. If it wasn't for e-mail spam filters (which separate out spam messages from genuine messages) our e-mail systems would be unusable.
  • 11. CONCLUSION  As technology evolves so does computers, internet, and hacking programs and methods. Terrorists and thieves now can attack via internet to individual users and even entire governments, generating fear, which develops in terror and creates conflicts. Methods such as pharming, phishing and E-Mail spamming are often used by hackers in order to get money or information from internet users. In this presentation we are going to make you aware of all this types of internet attacks, in order to keep security.