SlideShare a Scribd company logo
Technology Rules! Steve Freeman
Biometric Access Systems Can be used to verify identities to access information systems. Can also be used to track criminals and prevent future criminal action.
Spam Used as a means for marketing firms to reach many people at once. Annoys most people There are many ways to avoid spam however, it is for the most part unreliable.
Video Surveillance Used to keep track of businesses and other establishments. Can be used to track both employees and potential criminals. Some people are opposed to video surveillance because it provides too much information to governmental authorities.

More Related Content

What's hot

Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
Kunal Sharma
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
EMBplc.com
 
Cyber Insurance Types of Attacks
Cyber Insurance Types of AttacksCyber Insurance Types of Attacks
Cyber Insurance Types of Attacks
Statewide Insurance Brokers
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
 
Firewall
FirewallFirewall
Firewall
Rahul Baghel
 
Digital security
Digital securityDigital security
Digital security
malebaseball20
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
NormShield
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
Aleksandra Gavrilovska
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
Blue Coat
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
IS Decisions
 
Website security
Website securityWebsite security
Website security
RIPPER95
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
aimane
 
Networks
NetworksNetworks
Networks
AimiJii
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
Quick Heal Technologies Ltd.
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal
 

What's hot (20)

Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Cyber Insurance Types of Attacks
Cyber Insurance Types of AttacksCyber Insurance Types of Attacks
Cyber Insurance Types of Attacks
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Internet security
Internet securityInternet security
Internet security
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Firewall
FirewallFirewall
Firewall
 
Digital security
Digital securityDigital security
Digital security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
Website security
Website securityWebsite security
Website security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Networks
NetworksNetworks
Networks
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 

Viewers also liked

The Roles of Educational Technology in Learning.
The Roles of Educational Technology in Learning.The Roles of Educational Technology in Learning.
The Roles of Educational Technology in Learning.
KylaKathreen15
 
Computer lab rules asma
Computer lab rules asmaComputer lab rules asma
Computer lab rules asma
AlYamamah Primary
 
The role of Educational Technology in Learning
The role of Educational Technology in LearningThe role of Educational Technology in Learning
The role of Educational Technology in Learning
Renalyn Advincola
 
Using the Project-Based Multimedia as a Teaching-Learning Strategy
Using the Project-Based Multimedia as a Teaching-Learning StrategyUsing the Project-Based Multimedia as a Teaching-Learning Strategy
Using the Project-Based Multimedia as a Teaching-Learning Strategy
Renalyn Advincola
 
Technology in the Preschool Classroom
Technology in the Preschool ClassroomTechnology in the Preschool Classroom
Technology in the Preschool Classroom
TaylorJan
 
Technology And The Early Childhood Classroom
Technology And The Early Childhood ClassroomTechnology And The Early Childhood Classroom
Technology And The Early Childhood Classroom
Tara Vogelsberg
 
Technology In Early Childhood Education (ECE)
Technology In Early Childhood Education (ECE)Technology In Early Childhood Education (ECE)
Technology In Early Childhood Education (ECE)
kscholer
 
Technology in Early Childhood Education
Technology in Early Childhood EducationTechnology in Early Childhood Education
Technology in Early Childhood Education
mgalle
 
The roles of educational technology in learning
The roles of educational technology in learningThe roles of educational technology in learning
The roles of educational technology in learningMary Blaise Mantiza
 
Rules for Technology, Grades 1st-6th, Room 109
Rules for Technology, Grades 1st-6th, Room 109Rules for Technology, Grades 1st-6th, Room 109
Rules for Technology, Grades 1st-6th, Room 109
Lisa Berkery
 

Viewers also liked (10)

The Roles of Educational Technology in Learning.
The Roles of Educational Technology in Learning.The Roles of Educational Technology in Learning.
The Roles of Educational Technology in Learning.
 
Computer lab rules asma
Computer lab rules asmaComputer lab rules asma
Computer lab rules asma
 
The role of Educational Technology in Learning
The role of Educational Technology in LearningThe role of Educational Technology in Learning
The role of Educational Technology in Learning
 
Using the Project-Based Multimedia as a Teaching-Learning Strategy
Using the Project-Based Multimedia as a Teaching-Learning StrategyUsing the Project-Based Multimedia as a Teaching-Learning Strategy
Using the Project-Based Multimedia as a Teaching-Learning Strategy
 
Technology in the Preschool Classroom
Technology in the Preschool ClassroomTechnology in the Preschool Classroom
Technology in the Preschool Classroom
 
Technology And The Early Childhood Classroom
Technology And The Early Childhood ClassroomTechnology And The Early Childhood Classroom
Technology And The Early Childhood Classroom
 
Technology In Early Childhood Education (ECE)
Technology In Early Childhood Education (ECE)Technology In Early Childhood Education (ECE)
Technology In Early Childhood Education (ECE)
 
Technology in Early Childhood Education
Technology in Early Childhood EducationTechnology in Early Childhood Education
Technology in Early Childhood Education
 
The roles of educational technology in learning
The roles of educational technology in learningThe roles of educational technology in learning
The roles of educational technology in learning
 
Rules for Technology, Grades 1st-6th, Room 109
Rules for Technology, Grades 1st-6th, Room 109Rules for Technology, Grades 1st-6th, Room 109
Rules for Technology, Grades 1st-6th, Room 109
 

Technology rules

  • 2. Biometric Access Systems Can be used to verify identities to access information systems. Can also be used to track criminals and prevent future criminal action.
  • 3. Spam Used as a means for marketing firms to reach many people at once. Annoys most people There are many ways to avoid spam however, it is for the most part unreliable.
  • 4. Video Surveillance Used to keep track of businesses and other establishments. Can be used to track both employees and potential criminals. Some people are opposed to video surveillance because it provides too much information to governmental authorities.