Hanin Hussain University of Canterbury. Hanin Hussain University of Canterbury.
Ao4 powerpoint mrs hussain
-
Upload
aisha747 -
Category
Technology
-
view
125 -
download
0
Transcript of Ao4 powerpoint mrs hussain
![Page 1: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/1.jpg)
AO4 – Implications and Security Issues of the
InternetUnit 24:- Internet Past, Present and Future
![Page 2: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/2.jpg)
• Moral/ethical issues
• Social implications
• Commercial
Introduction
![Page 3: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/3.jpg)
Pornography
Chat rooms
Moral/ethical issues
![Page 4: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/4.jpg)
Has a number of negative effects on individuals and society.
Research has shown pornography has potential influences such as rape, domestic violence and sexual dysfunction.
Viewing of pornographic material may increase rates of sexual crimes.
Child pornography is a growing concern and can have devastating effects.
Pornography
![Page 5: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/5.jpg)
Sexual - Opens the doors to sexual predators - Used to share illegal and pornographic substances such as child pornography. Cyber bullying - Internet provides anonymity for those wishing to harass, insult or stalk others.- Easy to become a victim of cyber bullying through Facebook, message boards etc. False identity- Accounts can be created in seconds with false identities, profiles and email addresses.
Chat rooms
![Page 6: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/6.jpg)
Increased addiction
Changes in working practices
Social implications
![Page 7: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/7.jpg)
Internet addiction disorder
Excessive computer use interferes with daily life.
Shopping and gambling
25% of users fulfil the internet addiction criteria within the first 6 months of first using the
internet.
Increased addiction
![Page 8: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/8.jpg)
More people now work from home
Internet provides 24/7 access to work
Changes in working practises
![Page 9: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/9.jpg)
24 hour shopping
Advertising
Commercial
![Page 10: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/10.jpg)
Online deliveries
Improved security
Easy methods of paying online
Data tracking services
24 Hour shopping
![Page 11: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/11.jpg)
Online advertising is very popular and has grown hugely
Interactive advertisements
Search engine result pages
Advertising
![Page 12: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/12.jpg)
Viruses, Trojans, Worms, Spyware, Malware
Hackers
Phishing
Identity theft
Email attachments
Security risks
![Page 13: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/13.jpg)
Virus is a program which copies itself and infects a PC
Trojans are programs which pretend to be another program or something else. They can delete files on a computer.
A worm replicates itself in order to spread to other computers.
Spyware and Malware are often installed onto a computer without the users knowledge.
Viruses, Trojans, Worms, Spyware, Malware
![Page 14: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/14.jpg)
A computer hacker is an individual who finds weaknesses within a computer system and exploits them.
It can be authorized or unauthorized.
Hackers are today commonly associated with malicious programming attacks on the internet.
Hackers
![Page 15: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/15.jpg)
An attack where you are sent an email or phone call which asks you to click on a link and re enter your bank or credit card details.
They pretend to be from banks, online stores and service providers.
They appear genuine when in reality they are a fraud and will steal your details using them to their own advantage.
Phishing
![Page 16: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/16.jpg)
Identity theft is a form of stealing someone else’s identity.
Made easy due to the internet as people reveal personal information on the internet about themselves.
If someone is able to access someone else’s personal information they can commit fraud under their name.
Identity theft
![Page 17: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/17.jpg)
Hold big risks such as spread of malware, trojans and worms.
This is because emails contain attachments which may contain viruses which can infect your computer.
This happens once the infected email is opened.
Email attachments
![Page 18: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/18.jpg)
Fire walls
Anti virus
Code of practice
Encryption
Secure payment systems
Protection techniques
![Page 19: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/19.jpg)
A device which is designed to deny access to any unauthorized programs.
Many personal computer operating systems include firewalls which protect the computer from harm.
Firewalls
![Page 20: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/20.jpg)
Anti virus software is used to prevent, detect and remove any sort of malware.
Scans computers for viruses
It is important that anti virus software's are updated regularly.
Anti virus
![Page 21: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/21.jpg)
Translation of data into a secret code
In order to read encrypted data you must have access to a secret key or a password.
This can be used with important files. So if hackers were to get hold of the files they would not understand or be able to read the file without the password or key.
Encryption
![Page 22: Ao4 powerpoint mrs hussain](https://reader035.fdocuments.us/reader035/viewer/2022062418/5562d568d8b42a6c498b4f44/html5/thumbnails/22.jpg)
With secure payment systems customers are reassured that their payments are secure.
Several methods have been introduced which make payments secure.
SSL, HTTPS, PayPal
Secure payment systems