Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Section C Threats to Data.
UNIT 20 The ex-hacker.
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Prepared by: Nahed Al-Salah
Computer Viruses.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Worms & Trojan Horses
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Protecting Yourself Online (Information Assurance)
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IT Security for Users By Matthew Moody.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
Safety and Security issues of using ICT Alys brooks.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Edexcel GCSE Cyber security threats Computer Science 1CP1
DIGITAL CITIZENSHIP What You Should Know!.
CYBER SECURITY...
IT Security  .
Internet Safety Vocabulary
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Social Impacts of IT: P6 By André Sammut

Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social behaviour induction Problems with Privacy e-Commerce e-Government e-Schooling Quick access of Information Job loss because of IT automation

The Abuse of IT IT can be manipulated to harm. Spam Cyberbullying Phishing Denial of Service attacks These are usual ways people attempt to harm through the use of IT.

Spam Spam is a method of advertising used by some organisations. It is often found in the form of bulk s sent, or posts on message boards. Spambots crawl the internet for s and website where they can post. Spam is difficult to get away from but there are applications which can filter out suspected spam posts, as they often utilise a similar structure. Spam is also used for Phishing attacks.

Cyberbullying Just as bullying can take place in real life, the internet can be used for bullying. Cyberbullying can be difficult to end, as it tends to be more persistent. As one can remain anonymous on the internet, it is also hard to find the bully alone. The bully can still be found if authorities are brought in, although many victims would hesitate to report any cases.

Phishing A damaging problem, Phishing attacks are used to gather a victim’s personal information, such as credit card details. A common attack is the classic from a Nigerian prince offering millions of money. To prevent phishing attacks, use a spam filter on an and use an antivirus application. Phishing attacks can come in the form of spam s, viruses, key-loggers, and other input capturing devices/applications.

Denial of Service attacks Websites can only allow a certain amount of bandwidth. Usually an attacker who has a problem with a person or organisation would take up all the bandwidth of their website. This temporarily takes the website down and causes an increase in the hosting price. The perpetrator of the DoS attack could be found through IP logging, although a proxy or VPN may be used. The Mac address of the computer used will provide a reliable way to find the person behind one of these attacks.

Potential Threats caused by IT: M2 Threats that can cause such attacks and cause great inconvenience to users are these: Malware – Viruses – Worms Identity Theft Hacking

Viruses A virus is a kind of computer malware that can replicate itself from computer to computer. Viruses attach themselves to other programs and websites and download themselves to your computer. They accomplish many different things, some cause you tiny problems, others may delete important information.

Worms Worms are another type of malware, but unlike viruses, they do not need to attach themselves to a program. They usually find a failing in a computer connected to a network and use it to replicate itself. They try to waste the bandwidth of these networks.

Identity Theft A person on the internet can act under someone else’s identity. Whether they have hacked into another person’s account or phished out their details, it is dangerous. A person can damage someone else’s reputation and possibly ruin their finances due to this. Someone who doesn’t understand IT well may easily be stolen of their identity.

Hacking Hacking is not necessarily bad. White hat hackers usually get hired by companies to test out their system’s strengths and weaknesses. Black hat hackers only cause damage. Hackers have many motives, either to bully a person, damage one’s reputation, or steal their personal information. Hacking is unlike other attacks in that a person is directly breaking through a system’s vulnerabilities, as opposed to getting programs to ease the job. Thanks to this, a hacking attack can have unpredictable outcomes.