SlideShare a Scribd company logo
Software SharingandInternet Safety Ashley Walker Mary Witherspoon Lauren Zaloga
File Sharing Definition The downloading of a computer software to a user's computer, which then allows the user to make the software available to other users.
     Examples of Software           Sharing Sites LimeWire Napster FrostWire Pirate Bay
       Internet Activities            that Reveal    Personal Information Signing up for Internet services E-mail and List-Servings Instant Messaging  Social Networks Personal Websites and Blogs

More Related Content

What's hot

IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
iteclearners
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Web Passwords
Web PasswordsWeb Passwords
Web Passwords
Aung Khant
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
Onkar1431
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
thinkict
 
Common Online Terms
Common Online TermsCommon Online Terms
Common Online Terms
Clarice Rowan Rieza
 
Cyber Ethics
Cyber Ethics  Cyber Ethics
Cyber Ethics
YeshwanthP8
 
Technical 2
Technical 2Technical 2
Technical 2
Bhawna Aggarwal
 

What's hot (12)

IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
Security threats
Security threatsSecurity threats
Security threats
 
Web Passwords
Web PasswordsWeb Passwords
Web Passwords
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Common Online Terms
Common Online TermsCommon Online Terms
Common Online Terms
 
Cyber Ethics
Cyber Ethics  Cyber Ethics
Cyber Ethics
 
Technical 2
Technical 2Technical 2
Technical 2
 

Viewers also liked

Hcd bruner waldron april 5 conference
Hcd bruner waldron april 5 conferenceHcd bruner waldron april 5 conference
Hcd bruner waldron april 5 conference
ChildFamilyPolicyCenter
 
Launch Report
Launch ReportLaunch Report
Launch Report
garimapado
 
Presentación con Diapositivas (TP Nro 13)
Presentación con Diapositivas (TP Nro 13)Presentación con Diapositivas (TP Nro 13)
Presentación con Diapositivas (TP Nro 13)
Luciano Mortarotti
 
Álbum de Fotografías (TP Nro 13)
Álbum de Fotografías (TP Nro 13)Álbum de Fotografías (TP Nro 13)
Álbum de Fotografías (TP Nro 13)
Luciano Mortarotti
 
Final project) kamome diner
Final project) kamome dinerFinal project) kamome diner
Final project) kamome diner
koomilim
 
Final project) kamome diner
Final project) kamome dinerFinal project) kamome diner
Final project) kamome diner
koomilim
 
Beyond the GPL
Beyond the GPLBeyond the GPL
Beyond the GPL
Matt Ryan
 
President Obama Go Global Presentation992010
President Obama Go Global Presentation992010President Obama Go Global Presentation992010
President Obama Go Global Presentation992010
jwalkup_001
 
Community Partnerships
Community PartnershipsCommunity Partnerships
Community Partnerships
TulaneMCH
 
Pecahan fail pengurusan pss
Pecahan fail pengurusan pssPecahan fail pengurusan pss
Pecahan fail pengurusan pss
Osman Hj Mohamed
 
final proposal
final proposalfinal proposal
final proposal
koomilim
 
Cultural Competency
Cultural CompetencyCultural Competency
Cultural Competency
TulaneMCH
 
Social Marketing
Social MarketingSocial Marketing
Social Marketing
TulaneMCH
 
Tutorial 5.2 agus salim arsyad
Tutorial 5.2 agus salim arsyadTutorial 5.2 agus salim arsyad
Tutorial 5.2 agus salim arsyad
Aghost Mbz
 

Viewers also liked (15)

Hcd bruner waldron april 5 conference
Hcd bruner waldron april 5 conferenceHcd bruner waldron april 5 conference
Hcd bruner waldron april 5 conference
 
Launch Report
Launch ReportLaunch Report
Launch Report
 
Presentación con Diapositivas (TP Nro 13)
Presentación con Diapositivas (TP Nro 13)Presentación con Diapositivas (TP Nro 13)
Presentación con Diapositivas (TP Nro 13)
 
Álbum de Fotografías (TP Nro 13)
Álbum de Fotografías (TP Nro 13)Álbum de Fotografías (TP Nro 13)
Álbum de Fotografías (TP Nro 13)
 
Final project) kamome diner
Final project) kamome dinerFinal project) kamome diner
Final project) kamome diner
 
Final project) kamome diner
Final project) kamome dinerFinal project) kamome diner
Final project) kamome diner
 
Beyond the GPL
Beyond the GPLBeyond the GPL
Beyond the GPL
 
President Obama Go Global Presentation992010
President Obama Go Global Presentation992010President Obama Go Global Presentation992010
President Obama Go Global Presentation992010
 
Community Partnerships
Community PartnershipsCommunity Partnerships
Community Partnerships
 
Pecahan fail pengurusan pss
Pecahan fail pengurusan pssPecahan fail pengurusan pss
Pecahan fail pengurusan pss
 
final proposal
final proposalfinal proposal
final proposal
 
Cultural Competency
Cultural CompetencyCultural Competency
Cultural Competency
 
Social Marketing
Social MarketingSocial Marketing
Social Marketing
 
Tina i jones
Tina i jonesTina i jones
Tina i jones
 
Tutorial 5.2 agus salim arsyad
Tutorial 5.2 agus salim arsyadTutorial 5.2 agus salim arsyad
Tutorial 5.2 agus salim arsyad
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Presentation

  • 1. Software SharingandInternet Safety Ashley Walker Mary Witherspoon Lauren Zaloga
  • 2. File Sharing Definition The downloading of a computer software to a user's computer, which then allows the user to make the software available to other users.
  • 3. Examples of Software Sharing Sites LimeWire Napster FrostWire Pirate Bay
  • 4. Internet Activities that Reveal Personal Information Signing up for Internet services E-mail and List-Servings Instant Messaging Social Networks Personal Websites and Blogs