Presentation on theme: "Breaking Trust On The Internet"— Presentation transcript:
1Breaking Trust On The Internet Ethical and Social Issues in Information SystemsByProsper Olistdno:
2INTRODUCTION: What is Internet? The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.What is Trust?Complete confidence in something.
3INTRODUCTION(continue) Internet is today one of the most important part of our daily life. There are large numbers of things that can be done using the internet and is used for different purposes depending upon the requirement.Easy and cheap communicationShare files with others easily.Loads of informationFinancial Transactionservices
4INTRODUCTION(continue) Then this presentation is on the BREAK of that trust in the accept of internet perspective.
5Breaking Trust on the Internet Identity TheftPhishing.Chat Room PredatorsFalse InformationCyber BullyingSpamVirus ThreatSecurity
6Identity TheftDefinition: when someone uses your personal information without your permission to commit fraud or other crime.This can be done in various ways like using someone’sName.Social security number.Credit card number.Bank account number.Etc.
10Chat Room PredatorsChat room : supports real-time discussions among many people connected to networkSome pedophiles(any sexual interest in children or the act of child sexual abuse, often termed "pedophilic behavior".) meeting children, Through chat rooms.
11False information Quality of web-based information varies widely. Internet helps spread false informationAnybody can write and update false information on the internet through blog or other means.Not everything on the internet is accurate or correct.
12Cyber bullying What Is Cyber bullying? Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person.By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time.
13spamElectronic spamming is the use of electronic messaging systems to send unwanted bulk messages (spam), especially advertising. While the most widely recognized form of spam is spam,
14Virus ThreatA computer virus is a small software program that spreads from one computer to another and interferes with computer operation.A computer virus might corrupt or delete data on a computer, use an program to spread the virus to other computers, or even delete everything on the hard disk.
15Virus threat caseA hacker provided electronic files containing hotel advertisements to the newspaper, which began running the advertisements on its website. He then replaced the hotel advertisements with a file containing a malicious computer code, or malware, which infected the computers of people who visited the website and required them to purchase antivirus software for $49.95 to regain control of their computers. If the users did not purchase the software, their computers immediately became flooded with pop-ups containing false "security alerts," and all information, data and files stored on the computers became unreachable.
16SecurityInternet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.
17SecurityIts objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.
19Security break case Attackers forge Google's Gmail credentials Skype, Microsoft, Yahoo, Mozilla also targetedExtremely sophisticated hackers, broke into the servers of a web authentication authority and counterfeited certificates for Google mail and six other sensitive addresses.
20Law Enforcement needs to be aware of: Final thoughtsKnow this, your bank will NEVER ask you for account number or password.Law Enforcement needs to be aware of:Difference between annoying and dangerous communicationsHow to investigate a cyber crimeHow to obtain information from an ISP