Download presentation
Presentation is loading. Please wait.
Published byBasil Gibson Modified over 9 years ago
1
SECURITY ISSUES
2
TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES BECAUSE STORING IMPORTANT INFORMATION PHYSICAL THREATS THEFT, FLOOD, FIRE AND DAMAGE HACKERS PHISHING CONS PEOPLE INTO BELIEVING THAT EMAIL OR TEXT IS FROM A VALID ORGANISATION UNSECURED WIRELESS NETWORKS
3
WHAT TO DO? LATEST UPDATE ENCRYPTION BACKUPS
4
PRIVACY ISSUES SEARCH ENGINES – RECORD INFORMATION ABOUT YOUR SEARCHES, IP ADDRESS AND HOW LONG YOU SPENT. THIS TO PERSONALISE ADVERTS SOCIAL NETWORKING – KEEP TRACK OF YOUR INTERACTIONS COOKIES- SMALL TEXT FILES STORED ON YOUR COMPUTER AND CAN STORE YOUR BROWSING HABITS IDENTIFY THEFT HACKERS
5
MONITORING MOVEMENTS AND COMMUNICATIONS PASSPORTS ARE SCANNED ONLINE GAMES MONITORED WHO YOU PLAYING WITH SOCIAL NETWORKING MONITORING MOVEMENTS EMAILS COMPANIES ABLE TO MONITOR WHO YOU SEND EMAILS TO IP ADDRESS PROVIDE CLUES TO SEARCH ENGINES AND SOCIAL NETWORKING ABOUT YOUR GEOGRAPHICAL LOCATION CREDIT CARDS ALLOW THE BANKS TO KNOW WHERE, WHEN AND HOW MUCH MONEY YOU SPENT
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.