Download presentation
Presentation is loading. Please wait.
1
Communicating in the IT Industry
Lecture 11: Abuse of IT Warm up? Zatil Ridh'wah Hj Darot
2
Abuse of IT: Learning objectives Threats: Cyber bullying Spam Phishing
Denial of service attack (DOS)
3
Threats As with so many things in life, good things have a downside. This is certainly the case with the IT revolution and with the Internet in particular. There is a whole range of threats and annoyances that IT users need to be aware of and protected against.
4
Cyber bullying Cyber bullying can be a worrying problem for young people. There are a range of different methods that can be used, including social networking sites like Facebook, s and chatrooms. Cyber bullies often encourage their friends to join in the bullying.
5
spam Spam is unwanted advertising. Anyone with an account will tend to get unsolicited s, most of which are __________ rather than dangerous. But users should take particular care with s that have attachments, as these may contain viruses.
6
Phishing Phishing is a method used by criminals trying to trick people into providing their online banking password and security details. The scam works by criminals sending people an which looks as though it comes from their bank. The tells them to click a link within the which then directs them to a web page that looks like the log-on screen to their online bank account. However, the web page is under the criminals’ control and allows them to discover the victim’s username, _________ and other security details. The criminals then use these details to steal money from the victim’s bank account.
7
Denial of service attacks (DOS)
This is a method of preventing a web server from providing a service by overwhelming it with so many requests that it is unable to cope. There are several reasons why these types of attack might be made. For example, a criminal might attempt to _________an online retail company by threatening to attack the site unless given a large sum of money. Sometimes political sites are attacked in this way by people who don’t agree with the political views expressed on the sites.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.