SlideShare una empresa de Scribd logo
1 de 22
AO4 – Implications and Security
    Issues of the Internet
      Unit 24:- Internet Past, Present and Future
Introduction

• Moral/ethical issues

• Social implications

• Commercial
Moral/ethical issues

Pornography

Chat rooms
Pornography

Has a number of negative effects on individuals and society.

 Research has shown pornography has potential influences
such as rape, domestic violence and sexual dysfunction.

Viewing of pornographic material may increase rates of
sexual crimes.

Child pornography is a growing concern and can have
devastating effects.
Chat rooms
   Sexual
 - Opens the doors to sexual predators
 - Used to share illegal and pornographic substances such as
child pornography.
   Cyber bullying
- Internet provides anonymity for those wishing to harass, insult
or stalk others.
- Easy to become a victim of cyber bullying through
Facebook, message boards etc.
   False identity
- Accounts can be created in seconds with false identities, profiles
and email addresses.
Social implications

Increased addiction

Changes in working practices
Increased addiction
Internet addiction disorder

Excessive computer use interferes with daily life.

Shopping and gambling

25% of users fulfil the internet addiction criteria within the
first 6 months of first using the internet.
Changes in working practises
More people now work from home

Internet provides 24/7 access to work
Commercial
24 hour shopping

Advertising
24 Hour shopping
Online deliveries

Improved security

Easy methods of paying online

Data tracking services
Advertising
Online advertising is very popular and has grown hugely

Interactive advertisements

Email

Search engine result pages
Security risks
Viruses, Trojans, Worms, Spyware, Malware

Hackers

Phishing

Identity theft

Email attachments
Viruses, Trojans, Worms, Spyware, Malwa
                    re
Virus is a program which copies itself and infects a PC

Trojans are programs which pretend to be another program or
something else. They can delete files on a computer.

A worm replicates itself in order to spread to other
computers.

Spyware and Malware are often installed onto a computer
without the users knowledge.
Hackers
A computer hacker is an individual who finds weaknesses
within a computer system and exploits them.

It can be authorized or unauthorized.

Hackers are today commonly associated with malicious
programming attacks on the internet.
Phishing
An attack where you are sent an email or phone call which
asks you to click on a link and re enter your bank or credit
card details.

They pretend to be from banks, online stores and service
providers.

They appear genuine when in reality they are a fraud and will
steal your details using them to their own advantage.
Identity theft
Identity theft is a form of stealing someone else’s identity.

 Made easy due to the internet as people reveal personal
information on the internet about themselves.

If someone is able to access someone else’s personal
information they can commit fraud under their name.
Email attachments
Hold big risks such as spread of malware, trojans and
worms.

This is because emails contain attachments which may
contain viruses which can infect your computer.

This happens once the infected email is opened.
Protection techniques
Fire walls

Anti virus

Code of practice

Encryption

Secure payment systems
Firewalls
A device which is designed to deny access to any
unauthorized programs.

Many personal computer operating systems include firewalls
which protect the computer from harm.
Anti virus
Anti virus software is used to prevent, detect and remove
any sort of malware.

Scans computers for viruses

It is important that anti virus software's are updated
regularly.
Encryption
Translation of data into a secret code

In order to read encrypted data you must have access to a
secret key or a password.

This can be used with important files. So if hackers were to
get hold of the files they would not understand or be able to
read the file without the password or key.
Secure payment systems
With secure payment systems customers are reassured that
their payments are secure.

Several methods have been introduced which make
payments secure.

SSL, HTTPS, PayPal

Más contenido relacionado

La actualidad más candente

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 

La actualidad más candente (20)

Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Digital security
Digital securityDigital security
Digital security
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Destacado (6)

Day 3 Ancient Rome Legacies
Day 3 Ancient Rome LegaciesDay 3 Ancient Rome Legacies
Day 3 Ancient Rome Legacies
 
634 Vl
634 Vl634 Vl
634 Vl
 
November2010
November2010November2010
November2010
 
Modern World History: Prologue
Modern World History: PrologueModern World History: Prologue
Modern World History: Prologue
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 

Similar a Ao4 powerpoint mrs hussain

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sARYAS87
 

Similar a Ao4 powerpoint mrs hussain (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Ao4 powerpoint mrs hussain

  • 1. AO4 – Implications and Security Issues of the Internet Unit 24:- Internet Past, Present and Future
  • 2. Introduction • Moral/ethical issues • Social implications • Commercial
  • 4. Pornography Has a number of negative effects on individuals and society. Research has shown pornography has potential influences such as rape, domestic violence and sexual dysfunction. Viewing of pornographic material may increase rates of sexual crimes. Child pornography is a growing concern and can have devastating effects.
  • 5. Chat rooms Sexual - Opens the doors to sexual predators - Used to share illegal and pornographic substances such as child pornography. Cyber bullying - Internet provides anonymity for those wishing to harass, insult or stalk others. - Easy to become a victim of cyber bullying through Facebook, message boards etc. False identity - Accounts can be created in seconds with false identities, profiles and email addresses.
  • 7. Increased addiction Internet addiction disorder Excessive computer use interferes with daily life. Shopping and gambling 25% of users fulfil the internet addiction criteria within the first 6 months of first using the internet.
  • 8. Changes in working practises More people now work from home Internet provides 24/7 access to work
  • 10. 24 Hour shopping Online deliveries Improved security Easy methods of paying online Data tracking services
  • 11. Advertising Online advertising is very popular and has grown hugely Interactive advertisements Email Search engine result pages
  • 12. Security risks Viruses, Trojans, Worms, Spyware, Malware Hackers Phishing Identity theft Email attachments
  • 13. Viruses, Trojans, Worms, Spyware, Malwa re Virus is a program which copies itself and infects a PC Trojans are programs which pretend to be another program or something else. They can delete files on a computer. A worm replicates itself in order to spread to other computers. Spyware and Malware are often installed onto a computer without the users knowledge.
  • 14. Hackers A computer hacker is an individual who finds weaknesses within a computer system and exploits them. It can be authorized or unauthorized. Hackers are today commonly associated with malicious programming attacks on the internet.
  • 15. Phishing An attack where you are sent an email or phone call which asks you to click on a link and re enter your bank or credit card details. They pretend to be from banks, online stores and service providers. They appear genuine when in reality they are a fraud and will steal your details using them to their own advantage.
  • 16. Identity theft Identity theft is a form of stealing someone else’s identity. Made easy due to the internet as people reveal personal information on the internet about themselves. If someone is able to access someone else’s personal information they can commit fraud under their name.
  • 17. Email attachments Hold big risks such as spread of malware, trojans and worms. This is because emails contain attachments which may contain viruses which can infect your computer. This happens once the infected email is opened.
  • 18. Protection techniques Fire walls Anti virus Code of practice Encryption Secure payment systems
  • 19. Firewalls A device which is designed to deny access to any unauthorized programs. Many personal computer operating systems include firewalls which protect the computer from harm.
  • 20. Anti virus Anti virus software is used to prevent, detect and remove any sort of malware. Scans computers for viruses It is important that anti virus software's are updated regularly.
  • 21. Encryption Translation of data into a secret code In order to read encrypted data you must have access to a secret key or a password. This can be used with important files. So if hackers were to get hold of the files they would not understand or be able to read the file without the password or key.
  • 22. Secure payment systems With secure payment systems customers are reassured that their payments are secure. Several methods have been introduced which make payments secure. SSL, HTTPS, PayPal

Notas del editor

  1. Child pornography has physical, social, and psychological effects on children.
  2. Increased addiction to the internet has now become so known that is now known as an Internet addiction disorder. The introduction and ease of online activities such as online gambling and online shopping has contributed to the increased addiction to the internet.
  3. Working from home is known as teleworking. We are able to do this due to the advancements of technology and the internet. You are able to work from home if you have a phone, a computer and internet connection. This saves on travelling and other issues. 15,000 out off the 35,000 staff in HSBC bank have the ability to work from home due to the internet.
  4. The internet has allowed for shopping to be carried out 24/7 as only a computer and internet connection are needed to purchase items online. So unlike in a shop, customers are able to purchase items at any time of the day. Online deliveries are widely available for nearly every shopping website. The improved security such as the introduction of PayPal which is a very secure online payment method has contributed to customers feeling safe about paying online, therefore increasing the number of buyers who purchase goods online. There are also data tracking services which track the journey of your ordered item so you are able to know where it is and when it will come to you.
  5. Online advertising is a form of promotion which uses the internet to do so and to attract customers . It is a very popular form of promotion and has grown hugely, delivering marketing messages to all ranges. Online advertising allows for interactive advertisements such as video and moving pictures. It is a very successful method of promoting as nearly all people use the internet. Email is a popular way of sending advertisements to customers and other individuals. However this can be a major problem as unwanted email can be sent which is known as spam. Another popular place for advertising to be seen on the internet is on search engine result pages. Nearly every page has some sort of advertisement or promotion on it.
  6. A virus is a program which copies itself and infects a computer with harmful data spreading from one file to another and from one computer to another. This is able to happen when files are copied onto a different computer or shared. Trojans are programs which pretend to be another program. So for example an email sent to someone could contain a sound file which looks legitimate. But when the file is opened it may install a virus onto the users hard drive which may delete system files or damage the computer. A worm replicates itself in order to spread to other computers and carry threats which can cause a considerable amount of damage. Threats include damage to the operating system and they allow hackers to gain access to computers which they infect.Spyware and Malware are often installed onto a computer without the users knowledge and record behaviour on the internet. They are sometimes included in programs which you are able to download free from the internet.
  7. Authorized hackers are those which are certified and are allowed to hack into certain computers for reasons such as protecting the country form attack or so on. Unauthorized hackers on the other hand is not certified and is seen as a crime in most countries.
  8. Phishing email messages, phone calls and websites are designed to steal your money. They appear genuine but in reality are not real, but rather want to steal your bank or credit card details.
  9. Identity theft is where an individual impersonates someone usually for a financial gain.Personal information includes security numbers, signatures, addresses, phone numbers and banking and credit card information.So someone who accesses another individual’s personal information is carrying out identity theft.
  10. Encryption is the most effective way to keep data safe. With a secret key or password you are able to decrypt the encryption.
  11. SSL stands for secure sockets layer. This provides customers secure payments by using encryptions across a network.HTTPS also provides encryption across a network but uses authentication as well.PayPal is a safe online payment method which has been recently introduced.