Implications and Security Issues of the Internet By Neelesh Patel.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Implications and Security Issues of the Internet By Neelesh Patel.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
Cyber bullying and internet safety Parents meeting: staying safe online.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Prepared by: Nahed Al-Salah
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
THE GREATEST INVENTION OF THE LAST 50 YEARS: THE INTERNET.
Security Advice Georgie Pepper Campsmount Acadamy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Social impacts of the use of it By: Mohamed Abdalla.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
IT Security for Users By Matthew Moody.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
CYBER CRIME.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Get Safe Online Expert advice for everyone In association with.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Unit 4 IT Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Implications and Security Issues of the Internet By Neelesh Patel

Moral/Ethical Issues

Pornography Pornography is explicit material available to view over the internet. It can be accessed by anyone who has access to the internet. It can lead to people getting hold of content that may be unsuitable to users. Also content on the internet may then be misused and this can become a threat to those involved in the content and may put people at risk to things such as paedophiles. Content found on some websites may not be suitable for the users and may be illegal and disturbing. Pornography use can be prevented by setting high levels of security so they cannot be accessed on computers. Also monitoring computer usage to ensure that the user is not accessing anything they should not be. Computer administrators can also block certain websites to deny access to pornography content.

Examples In 2006 a federal judge ruled in favor of the Cedarburg School District in a civil law suit which was filed by Robert Zellner. Robert Zellner was a high school science teacher who lost his job for viewing pornography on his school computer. Gregory J. Azcueta a fifth grade harbor city elementary teacher was fired from Brevard country school for viewing pornographic websites on school computers _1_brevard-teacher-brevard-county-school-officials-clickorlando-com

and chat room abuse s and chat rooms are a common method of communication for socialising along with social networking site. They are used by many teenagers around the world and allows users to talk and communicate amongst each other. However there are disadvantages to the use of s and chat rooms because things can be said over to upset other people or offend them. Users may also get bullied over ing or chat rooms and this could lead to the user becoming affected. Also there are security issues with identity as people may make fake accounts pretending to be someone they are not. As well as this users should be careful when exchanging personal information on chats and s. Problems with and chat rooms can be prevented by setting high security controls to prevent the use of chat rooms and only add people you know and like. Also set profiles on websites to private so that only certain people can have access to you.

Examples Patrick Green was sentenced to five years imprisonment for the sexual abuse of a 13-year-old girl who he met in an Internet chatroom. becoming-safer-for-children / becoming-safer-for-children / The Internet Crime Forum (ICF) report, revealed that one in five of the 4.8 million children online in the UK have been approached by pedophiles in Internet chatrooms. paedophile-crackdown / paedophile-crackdown /

Social Implications

Changes in working practices The internet has allowed businesses to allow there workers to work from home through the use of online networking. It makes work become more accessible as users can work whenever they want from the comfort of there home. It is also very convenient as it means the workers wont have to go out of there way to get to work and work done. However it may cause the business to have breakdowns in communication with its employees because they will be working from home and they wont see each other. Also distractions may be caused when working at home leading to less work being done.

Home working is certainly on the rise. A survey of firms by the Confederation of British Industry showed that the number offering at least some teleworking rose from 14% in 2006 to 46% in British Telecom was one of the pioneers. It began a telework scheme in 1986, and now has 15,000 homeworkers out of 92,000 employees. The company argues that homeworkers save it an average of £6,000 a year each, are 20% more productive and take fewer sick days. An example of teleworking would be a telesales employee working from home. Examples

Increased addiction Users may become addicted to using the internet and may become too reliant on it. This is because the internet can be used for almost anything and it means that people don’t have to go out much in order to do everyday things such as socialize, shop and work. This is bad because users may become less socially active and may become totally reliant on the internet, this may lead to people becoming unhealthy and perhaps over weight because of there lack of exercise. Also constant use of computers may lead to problems in the future such as neck strain, eye problems and strain within the wrist. This can be prevented by using suitable techniques such as using a suitable chair with a neck support, keeping the computer at a reasonable distance and using a mouse mat with a wrist support.

An example of internet addiction would be someone who spends a majority of there days on the internet and decides to stay at home on the internet and not socialise or move away from the monitor. Internet addiction can be for many reasons for instance addiction to online shopping, facebook or games, etc. Examples

Commercial

Better deals online The internet has allowed business to introduce online shopping. Along with online shopping comes special online deals that attracts and persuades users to online shop. This is bad because users may become persuaded to use online shopping and may get carried away with how much money they actually spend online and this could lead to debt problems in the future. Also the customers cannot be sure of the quality of the goods that they buy when shopping online. Price may influence users to buy goods instead of the quality and features of the goods. Users will have to use there credit card to purchase online and this can lead to problems depending on the security of the website.

Users can use price comparison sites to find cheapest deals online. Users can manually compare prices from different stores. Users can go on auction sites such as EBay to try and find bargains. Examples

24 hour shopping The internet allows users to do there shopping online. Shopping can be done any time during the day and will usually be delivered within a few days. Almost anything can be brought online from groceries, clothes, electrical goods, etc. The internet also makes it easer to find goods and services and therefore users tend to shop online because it is more convenient and easy, it also requires less time and minimum effort. This can be bad because it means users will no longer be going out to get there shopping and this reduces the amount of time people spend socializing and being active. As well as this customers have to pay using credit cards and this can make them more vulnerable to credit card fraud.

Users can order there home grocery shopping any time of the day and receive it next day. Users can purchase goods online and can choose home delivery or in store collection to get the item. Examples

Security Risks

Hacking In most cases a hacker is someone who breaks into computers and computer networks to gain vital information or to gain a sense of achievement. Hacking can lead to potential problems such as personal information being viewed, stolen or misused. This may include addresses, names, telephone numbers and bank details. It could also be content of a network that you may not want to be accessed such as personal documents. This is bad because this can lead to the misuse of personal information. You can help to prevent hacking by enabling a firewall on your computer or laptop, this will help to block hackers and viruses out of networks. Also use a anti-virus programme that will also try to block any hackers/viruses.

In 2011 Sony’s Playstation Network was hacked. This lead to the Playstation Network being shut down for weeks so that Sony could try to fix the problems caused from the hacking. The hacking caused serious threats to users as bank account details, s and home addresses could of have been found from this. sony sony Thousands of accounts belonging to Xbox Live customers have been hacked into by online criminals who have stolen millions of pounds, it has been reported hacked-in-fresh-cyber-fraud-case.html hacked-in-fresh-cyber-fraud-case.html Examples

Viruses A computer virus is a programme that can copy itself to various files of your computer and can affect the performance of your pc. A computer virus can seriously affect your computers performance and slow down your system. It can also lead to programmes not working properly as well as leading to data and content being lost on your device. Viruses can seriously affect networks and can cause them to not operate properly. This can cause serious problems in a work place that relies heavily on the internet. Viruses can be prevented by enabling a firewall, this will block hackers and viruses out of networks. Also use a anti-virus programme that will also try to block any hackers/viruses.

An example of getting a Computer Virus would be having one or more of the following symptoms… Computer is running slower than usual. The computer stops responding regularly. The computer restarts on its own or don’t run as usual. Computer applications not functioning properly. Receiving error messages. Having a virus could lead to your computer failing to work correctly, loss of data or perhaps misuse of personal data. Examples

Protection Techniques

Firewalls – Software and Hardware The use of a firewall can help to defend computers form any unwanted entry from hackers and software. It monitors all of the data that flows in and out of the computer and will only allow access if it is safe for the computer. Firewalls are a common us of protection as they come built in on most PC’s. They are built into PC’s so that they have some form of protection. However in many cases firewalls have been surpassed and have failed to do there job, this is why it is recommended to have some form of anti virus software as back up to help ensure that your PC is less vulnerable to any threats. They operate by ensuring that no unauthorized access Permits passed the wall. This helps to keep the PC safe from any potential threats that could harm the computer or gain access to personal information or content.

Anti virus software Anti virus software can be used to help protect your computer from getting viruses and can help make it less vulnerable to computer hacking. Anti virus software can allow users to scan there computer for viruses, worms, Trojans, spyware and malicious software. Users can scan there computer regularly and can also change the settings of the software so that it scans regularly automatically. The use of anti virus and anti spyware software can help to keep your computer running at high performance levels, as well as protecting computer content that could potentially be accessed if there was no software installed. they help to identify any risks and threats when surfing the internet and downloading content online. They are designed to identify the potential threats and issues and warn the user of them, once this is done they block any access

Code of Practice A code of practise is a code set by the business that can guard against behaviour which can guard against behaviour which may be seen as a risk towards the network. A good code of practise will include.. A strong password Regular password changes (e.g.. Every 3 months) Avoiding suspicious s from unknown senders Not downloading suspicious files

Secure Payment Systems When shopping online customers will want to ensure that there payments are secure and that there is no threats when purchasing goods online. There are many methods that users can use to ensure there payment is secure. PayPal – PayPal is a trusted online business that deals with transactions securely. E.G. When purchasing something off a website (e.g. eBay) I can purchase the good by agreeing to buy the item. However when it comes to paying for the item and completing the transaction for the item users want to be sure that they can trust the website with their money. This is why people use websites such as PayPal to complete online transactions. PayPal is a business that runs online and deals with money transfers and transactions in a secure manner. Prepay Cards – prepay cards are cards that contain a certain amount of money that has been transferred onto the card. They are similar to debit cards in the sense that you cannot spend over your allowance. They arwe a secure method of payment as it does not require you to enter your personal information such as bank details online when purchasing. This prevents the risk of credit card fraud. HTTPS – these provide a secure encryption and authentication for users and prevents any kind of hacking or data misuse. These websites are secure and are often trusted by website users.