THREATS. A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO Isolation Body.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Internet Safety in Schools
Youth and Social Networking Sites Comenius Project
BlueRedGreenPurpleOrange.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Forms of Cyberbullying
The Internet.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Important Facts you should know about the Net
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Threats To A Computer Network
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses & Destructive Programs
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Protecting Yourself Online (Information Assurance)
Digital Citizenship Project
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Staying Safe Online A Practical Guide for Middle School Students.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Moral, Social and Ethical issues associated with the Internet
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Topic 5: Basic Security.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Safety.
Cyberbullying Can be done by anyone to anyone
CYBER SECURITY...
There are approximately 500million tweets sent every day
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
What devices use the internet?
Presentation transcript:

THREATS

A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO Isolation Body diseases (e.g. obesity) Ophthalmic and muscular problems Physical exercise dereliction Absence either from school or any other place ADDICTION

Specifically, addicted users face serious integration problems in the fields of work, school an even in this society. In this way, The addiction/overuse of the Net deprives every person’s right of equal chances.

Electronic games that include violence, assassinations etc., may have serious impacts on the behavior and character of youth. There is much evidence which displays the connection between violent games and long term anti-social and violent attitudes. The most fatal danger that ambushes is the identification of the player with the avatar.

When we say electronic gambling we mean the action where two or more people contact with each-other online and bet. An action like that can cause the loss of real money.

Online misinformation is possible to happen with the presentation of a various fake/untrue information on websites that want to mislead us. Also, misinformation happens even when our information is incomplete and as a result people are led to wrong opinions. Results:  People’s manipulation  Fanaticism & Violence  Democracy undermining

Usually, by saying inappropriate, we mean a content which can cause mental disorder, shock or even promote wrong attitude. It can be caused by:  Unreliable Websites  Online Games 

Unwanted messages (spam) Are the messages that under normal circumstances users wouldn’t choose to see and are delivered to a lot of people. For example, messages that include promotion of doubtful products, and their content is related to ψευδοτυχερα παιχνιδια, ψευδονομικές υπηρεσίες, κτλ. Something really common is the reception of chain- messages. These messages are unwanted and the expeditor asks the recipient to promote the message to other people he knows.

Grooming: ● Is the process at which, pedophiles, pretending to be minors, use the internet in order to attract children with a view to abuse them. ● ž Web pages with inadequate sexual content: ● -Are humiliating the human personality ● -Are infringing the right of children to innocence.

Children's pornography is the representations of minors that participate in sexual action or situations that imply sexual activities. Sometimes the definition includes pictures that have been photoshoped from computer. The children's pornography is considered as crime and beings in penal sanctions.

Major infringements online are:  Interception of our personal data  Electronic fraud  Malware  Cyberbullying Our navigation online has many things in common with reality. Whatever we do online always leaves traces!

Cookies Cookies Cookies are bits of information such as username, registry details on a website, preferences, online shopping etc. Legal companies use Cookies to make offers to users who visit them frequently. Illegal companies use Cookies in order to collect user’s information and sell them to Marketing corporations. Interception of our personal data

Phishing: “Phising” in the act in which someone tries to obtain information after making sure he is disguised to a trustworthy entity of electronic communication. During this tactic, experts reveal personal data to a false form online. Electronic fraud Pharming: It is a form of scam. As a result, the user believes that he is in a genuine website with real URL.

Malware Virus: The infection happens when a user is asked to receive a file… When he tries to use it, virus spreads everywhere infecting his computer system. It destroys other files and even the hard drive.

Trojan: Trojan: Is a malware that fools the user and makes him believe that he carries out a useful function while it secretly installs other malwares as well. Worm: A computer worm is self-replicating malware computer program, which uses computer networks to send copies of itself to other computer networks and may happen without the user’s intervention.

Adware Adware: A Software that displays or downloads commercials automatically on a computer. Spyware Spyware: A program that collects information from someone without his approval.

Cyberbullying

Bullying is possible to happen via the Internet, mainly via the electronic post ( ), blogs and chat rooms. It includes intentional, repeated and hostile behavior toward individual or team of individuals that want to cause sentimental and psychological damage.

● Forms of intimidation: ● Teases amining at the amusement ● Share of offensive reputation ● Sexual Abuse ● Libel in others via photographs, messages and video in the internet