Mehnaaz Asad IB2-3. Why do they use the Internet?  Easy access to the Internet's resources  Little or no regulation, censorship, or other forms of government.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

IAEA International Atomic Energy Agency EPR-Public Communications L-09 Audiences and Communication Channels.
Chapter 2 Digital Terrorism.
Audio and Visual Technologies
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
Using the Internet: Making the Most of the Web’s Resources James B. Dang Associate Professor/Department Chair of Computer Science Southeast Campus.
Maninder Kaur COMPUTER NETWORKS Maninder Kaur 14/10/2010
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
A shared calendar is: a calendar that can be shared among any amount of people. Family, friends, and business workers are able to use this. A shared calendar.
Santagio and Efrain. Shared Calendars Sharing Microsoft Outlook just got even easier... Tested and Certified to Support the new Microsoft Outlook 2010.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
The Internet Useful Definitions and Concepts About the Internet.
Overview of Digital Stenography
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Computer Literacy Presentation C. Otero Katie Carson, Dianna Jenkins, John Willis-Morris.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Spring 2007.
Video Streaming for Web Pages Jacqueline Altieri.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Optimizing Public Relations with Social Media Jana Baxter Instructional Media Services Coordinator Allegheny Intermediate Unit
Unit 1 - The Internet CSC CSC The Origin of the Internet  ARPANET  Advanced Research Projects Agency Network  Funded by the U.S. government.
LESSON 3 – ONLINE COMMUNICATION Mr Cole. ONLINE COMMUNITIES  People who are computer literate, and have the equipment, can form groups or ‘societies’
1 Team Management System (TMS) By DACCIT Pvt. Ltd., Indore.
Internet.
CULTUR-EXP CULTURe EXchange Platform. Core functionality and Requirements Users: types, functionality, access and privacy Content: types and requirements.
An Post Mail Media Unit e-learning Platform InterDirect Rembrandt Group 1.
CONNECTING LEARNERS USING WEB 2.0 TOOLS GERARDO A. SCHOELLER INSTRUCTIONAL TECHNOLOGY Dr. Nicolas Diogo 10/24/2013.
Social Networking Vocabulary Cycle 2. Blog Vocabulary  blog – a personal or professional website which is updated on a regular basis with an individual’s.
Jane Doe PowerPoint assignment for FAM 332 April 27, 2015.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Chapter 8: Collaborating with Technology Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Chapter 8: Collaborating with Technology Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Computing Revision Notes. Index Software System Software Internet.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
 Commercial- to sell or promote company products  Portal- provide a variety of everyday services  Informational- provide useful info & news  Educational-
Imapact of I.T on International Commerce: Management of transnational corporations and Business Concentrations.
USING SHORT STORIES, VIDEO SUMMARIES AND INFOGRAPHICS TO BUILD CREDIBILITY IN STATISTICS.
Mass Media AP GoPo. What are the different types of mass media?
 Multi (Latin): Many/Much  Media (Latin): An intervening substance through which something is transmitted on.
Assignment 2 Alicia DeMarco CSC /6/07.  Blogs are like diaries, they are entries written in order to share information. Some common topics of.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
Support the spread of “good practice” in generating, managing, analysing and communicating spatial information Processing and Packaging Information for.
A Day of technology Improving upon your technology skills Giving every child the opportunity to learn in a robust digital environment everyday. making.
Multimedia Systems Option Topic 2. Multimedia Systems  A Multimedia system combines different types of media into interactive information systems. 
SMARTMAIL 3.0. OVERVIEW ● CLIENT ● WORKS WITH IMAP AND SMTP MAIL SERVER ● OFFERS SECURE , WORK FLOW MESSAGES, TRANSLATION ● PLUG-IN ARCHITECTURE.
Objective Understand the core concepts of digital media.
Web Authoring: Creating an Educational Blog David Wicks Assistant Professor Director of ITS 1.
Communicating through the Internet Chapter 3. Instant Messaging Instant Messaging services are programs that enable you to communicate in real time with.
Mobile phones have changed the way we communicate, they allow us to send text messages and call people while on the go. Modern android phones such as.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Objective % Understand the core concepts of digital media
Computer virus Done: Aaesha Mohammed ID: H
ADVANCED COMPUTER TO, Kanishka Sir's. Introduction to Whatsapp Whatsapp Inc. Was Founded In 2009 By Brian Acton And Jan Koum (Also The Current CEO) Whatsapp.
Exchanging information. Communications 1 Communications enable organizations to keep in touch with Staff, Suppliers, Customers – actual & potential.
Terrorist use of Internet : the virtual battlefields ? Contents and evolution of the use of Internet by extremist networks.
 To increase the awareness of young people around the process of radicalisation of individuals.  To enable young people to identify and discuss factors/indicators.
FOOTPRINTING STEGANOGRAPHY.
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
Collective Memory in Mass Media & Society Audrey D.
Making Sense of New Media Sue Fidler 26th April 2007.
Marking the Most of the Web’s Resources
Match Up By: Brittney Bogues.
CONTENT CREATION Standard 3.
Rapidshare Clone - Megaupload Script - Php File Sharing Script - File Upload Script
Virus And Malware Causes And Troubleshoot By I FIX PC
Solutions of Hotmail Problems Source Hotmail Issue.
Media, Technology and Politics
Presentation transcript:

Mehnaaz Asad IB2-3

Why do they use the Internet?  Easy access to the Internet's resources  Little or no regulation, censorship, or other forms of government control  Potentially huge audiences spread throughout the world  Anonymity of communication when using VoIP and Messenger programs  Fast flow of information ( enabling the fast communication)  The internet offers the ability to combine text, graphics, audio, and video and to allow users to download films, songs, books, posters etc.  The ability to use the Internet as a broadcast media ( the popularity and the number of users increases each day)

How terrorists use the Internet  Psychological Warfare  Terrorists can use the Internet to spread disinformation, to deliver threats intended to spread fear and helplessness, and to show horrific images of recent actions such as replaying events through the websites.  Cyberwarfare and cyberterrorism

 Terrorists use the Internet not only to learn how to build bombs but also to plan and coordinate specific attacks. Al Qaeda members relied heavily on the Internet in planning and coordinating the September 11 attacks.  Hamas activists in the Middle East use chat rooms to plan operations and exchange to coordinate actions.  Instructions in the form of maps, photographs, directions, and technical details of how to use explosives are often disguised by means of steganography, which involves hiding messages inside graphic files. steganography

EXAMPLES  Recently, the Obama and the McCain campaigns were hacked into by a foreign government (China) trying to know their policies in advance.  9/11  Saddam Hussein’s execution video on youtube.  Attacks on the Taj hotel in India in 2008

SocialEthical  Political  Psychological  Reliability: information used by or handed out by terrorists.  Security: data mining  Authenticity: Terrorists could disguise themselves  Equality of access  Globalisation