SlideShare a Scribd company logo
THE INTERNET IS IT SAFE? WHAT
ARE THE TYPES OF THREATS THAT
CAN ATTACK YOU ONLINE ?
HOW EASY IS IT FOR SOME ONE TO STEEL YOUR
   IDENTITY ?
WHAT ARE THE DIFFERENT TYPES
OF VIRUSES ON THE INTERNET?
AND HOW DO THEY SPREAD ?
WHAT ARE THE SYMPTOMS OF YOUR COMPUTER
HAVING A VIRUS ?
WHEN SOME ONE TAKES YOUR IDENTITY IT WOULD
SURPRISE YOU HOW EASY IT IS . ALL IT TAKES IS SOME
BASIC INFORMATION ABOUT YOU .THIS INFORMATION
CAN BE NAME ,DATE OF BIRTH ,AND A SOCIAL SECURITY
CARD NUMBER A TELEPHONE NUMBER AND MAYBE
EVEN THE NAMES OF FAMILY MEMBERS .ONE SIMPLE
CONVERSATION CAN COST YOU, YOUR IDENTITY .ONCE
THAT INFORMATION IS OUT THERE THEY BEGIN TO
MAKE ACCOUNTS IN YOUR NAME WITH OUT YOU
KNOWING ANYTHING .
ONCE YOU ARE A VICTIM OF IDENTITY THEFT
IT IS HARD TO PROVE THAT YOU ARE INNOCENT
.IT COULD TAKE YEARS TO PROVE THAT YOU
WERE A VICTIM AND YOU STILL HAVE TO PAY
THE PRICE OF THE THEFTS PURCHASES .YOU
WILL HAVE TO GO TO YOUR CREDITORS AND
TALK WITH THEM ABOUT THIS PROBLEM AND
MAKE A POLICE REPORT SO ANY MORE
CHARGES THAT ARE MADE YOU WONT HAVE TO
PAY FOR THAT AS WELL
Do you know all of the threats
that are out there online ?Well
there are plenty there are
viruses but they have other
names .Thojaners, worms
,dialers, hijackers, spyware and
keyloggers. They can come onto
your computer through
advertisements and false
messages
THERE ARE SIMPLE WAYS TO KNOW IF YOUR
COMPUTER IS GETTING A VIRUS .IF YOUR
INTERNET IS RUNNING SLOW THAT’S A SIGN. ALSO
IF U NOTICE THAT YOUR PROGRAMS ARE MISSING
AND HAVE BEEN DELETED THAT IS A SIGN THAT
SOMETHING OR SOME ONE HAS CORRUPTED YOUR
COMPUTER
THE COMPUTER IS REALLY NOT AS SAFE AS
YOU THINK .PEOPLE GET THERE IDENTITY
STOLEN EVERY TWO SECONDS .

More Related Content

Similar to The Internet Is It Safe

cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
angelosoriano12
 
Kristian on cyber safety
Kristian on cyber safetyKristian on cyber safety
Kristian on cyber safety
Pentucket Regional High School
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
CapRockTelephone
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
JulianEvangelista1
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
forensicsnation
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
Cyber crime
Cyber crimeCyber crime
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
NavinKumarDewangan
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
Pentucket Regional High School
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
vjom
 

Similar to The Internet Is It Safe (20)

cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Kristian on cyber safety
Kristian on cyber safetyKristian on cyber safety
Kristian on cyber safety
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

The Internet Is It Safe

  • 1. THE INTERNET IS IT SAFE? WHAT ARE THE TYPES OF THREATS THAT CAN ATTACK YOU ONLINE ?
  • 2. HOW EASY IS IT FOR SOME ONE TO STEEL YOUR IDENTITY ?
  • 3.
  • 4. WHAT ARE THE DIFFERENT TYPES OF VIRUSES ON THE INTERNET? AND HOW DO THEY SPREAD ?
  • 5. WHAT ARE THE SYMPTOMS OF YOUR COMPUTER HAVING A VIRUS ?
  • 6. WHEN SOME ONE TAKES YOUR IDENTITY IT WOULD SURPRISE YOU HOW EASY IT IS . ALL IT TAKES IS SOME BASIC INFORMATION ABOUT YOU .THIS INFORMATION CAN BE NAME ,DATE OF BIRTH ,AND A SOCIAL SECURITY CARD NUMBER A TELEPHONE NUMBER AND MAYBE EVEN THE NAMES OF FAMILY MEMBERS .ONE SIMPLE CONVERSATION CAN COST YOU, YOUR IDENTITY .ONCE THAT INFORMATION IS OUT THERE THEY BEGIN TO MAKE ACCOUNTS IN YOUR NAME WITH OUT YOU KNOWING ANYTHING .
  • 7. ONCE YOU ARE A VICTIM OF IDENTITY THEFT IT IS HARD TO PROVE THAT YOU ARE INNOCENT .IT COULD TAKE YEARS TO PROVE THAT YOU WERE A VICTIM AND YOU STILL HAVE TO PAY THE PRICE OF THE THEFTS PURCHASES .YOU WILL HAVE TO GO TO YOUR CREDITORS AND TALK WITH THEM ABOUT THIS PROBLEM AND MAKE A POLICE REPORT SO ANY MORE CHARGES THAT ARE MADE YOU WONT HAVE TO PAY FOR THAT AS WELL
  • 8. Do you know all of the threats that are out there online ?Well there are plenty there are viruses but they have other names .Thojaners, worms ,dialers, hijackers, spyware and keyloggers. They can come onto your computer through advertisements and false messages
  • 9. THERE ARE SIMPLE WAYS TO KNOW IF YOUR COMPUTER IS GETTING A VIRUS .IF YOUR INTERNET IS RUNNING SLOW THAT’S A SIGN. ALSO IF U NOTICE THAT YOUR PROGRAMS ARE MISSING AND HAVE BEEN DELETED THAT IS A SIGN THAT SOMETHING OR SOME ONE HAS CORRUPTED YOUR COMPUTER
  • 10. THE COMPUTER IS REALLY NOT AS SAFE AS YOU THINK .PEOPLE GET THERE IDENTITY STOLEN EVERY TWO SECONDS .