Más contenido relacionado


Ao4 powerpoint mrs hussain

  1. AO4 – Implications and Security Issues of the Internet Unit 24:- Internet Past, Present and Future
  2. Introduction • Moral/ethical issues • Social implications • Commercial
  3. Moral/ethical issues Pornography Chat rooms
  4. Pornography Has a number of negative effects on individuals and society. Research has shown pornography has potential influences such as rape, domestic violence and sexual dysfunction. Viewing of pornographic material may increase rates of sexual crimes. Child pornography is a growing concern and can have devastating effects.
  5. Chat rooms Sexual - Opens the doors to sexual predators - Used to share illegal and pornographic substances such as child pornography. Cyber bullying - Internet provides anonymity for those wishing to harass, insult or stalk others. - Easy to become a victim of cyber bullying through Facebook, message boards etc. False identity - Accounts can be created in seconds with false identities, profiles and email addresses.
  6. Social implications Increased addiction Changes in working practices
  7. Increased addiction Internet addiction disorder Excessive computer use interferes with daily life. Shopping and gambling 25% of users fulfil the internet addiction criteria within the first 6 months of first using the internet.
  8. Changes in working practises More people now work from home Internet provides 24/7 access to work
  9. Commercial 24 hour shopping Advertising
  10. 24 Hour shopping Online deliveries Improved security Easy methods of paying online Data tracking services
  11. Advertising Online advertising is very popular and has grown hugely Interactive advertisements Email Search engine result pages
  12. Security risks Viruses, Trojans, Worms, Spyware, Malware Hackers Phishing Identity theft Email attachments
  13. Viruses, Trojans, Worms, Spyware, Malwa re Virus is a program which copies itself and infects a PC Trojans are programs which pretend to be another program or something else. They can delete files on a computer. A worm replicates itself in order to spread to other computers. Spyware and Malware are often installed onto a computer without the users knowledge.
  14. Hackers A computer hacker is an individual who finds weaknesses within a computer system and exploits them. It can be authorized or unauthorized. Hackers are today commonly associated with malicious programming attacks on the internet.
  15. Phishing An attack where you are sent an email or phone call which asks you to click on a link and re enter your bank or credit card details. They pretend to be from banks, online stores and service providers. They appear genuine when in reality they are a fraud and will steal your details using them to their own advantage.
  16. Identity theft Identity theft is a form of stealing someone else’s identity. Made easy due to the internet as people reveal personal information on the internet about themselves. If someone is able to access someone else’s personal information they can commit fraud under their name.
  17. Email attachments Hold big risks such as spread of malware, trojans and worms. This is because emails contain attachments which may contain viruses which can infect your computer. This happens once the infected email is opened.
  18. Protection techniques Fire walls Anti virus Code of practice Encryption Secure payment systems
  19. Firewalls A device which is designed to deny access to any unauthorized programs. Many personal computer operating systems include firewalls which protect the computer from harm.
  20. Anti virus Anti virus software is used to prevent, detect and remove any sort of malware. Scans computers for viruses It is important that anti virus software's are updated regularly.
  21. Encryption Translation of data into a secret code In order to read encrypted data you must have access to a secret key or a password. This can be used with important files. So if hackers were to get hold of the files they would not understand or be able to read the file without the password or key.
  22. Secure payment systems With secure payment systems customers are reassured that their payments are secure. Several methods have been introduced which make payments secure. SSL, HTTPS, PayPal

Notas del editor

  1. Child pornography has physical, social, and psychological effects on children.
  2. Increased addiction to the internet has now become so known that is now known as an Internet addiction disorder. The introduction and ease of online activities such as online gambling and online shopping has contributed to the increased addiction to the internet.
  3. Working from home is known as teleworking. We are able to do this due to the advancements of technology and the internet. You are able to work from home if you have a phone, a computer and internet connection. This saves on travelling and other issues. 15,000 out off the 35,000 staff in HSBC bank have the ability to work from home due to the internet.
  4. The internet has allowed for shopping to be carried out 24/7 as only a computer and internet connection are needed to purchase items online. So unlike in a shop, customers are able to purchase items at any time of the day. Online deliveries are widely available for nearly every shopping website. The improved security such as the introduction of PayPal which is a very secure online payment method has contributed to customers feeling safe about paying online, therefore increasing the number of buyers who purchase goods online. There are also data tracking services which track the journey of your ordered item so you are able to know where it is and when it will come to you.
  5. Online advertising is a form of promotion which uses the internet to do so and to attract customers . It is a very popular form of promotion and has grown hugely, delivering marketing messages to all ranges. Online advertising allows for interactive advertisements such as video and moving pictures. It is a very successful method of promoting as nearly all people use the internet. Email is a popular way of sending advertisements to customers and other individuals. However this can be a major problem as unwanted email can be sent which is known as spam. Another popular place for advertising to be seen on the internet is on search engine result pages. Nearly every page has some sort of advertisement or promotion on it.
  6. A virus is a program which copies itself and infects a computer with harmful data spreading from one file to another and from one computer to another. This is able to happen when files are copied onto a different computer or shared. Trojans are programs which pretend to be another program. So for example an email sent to someone could contain a sound file which looks legitimate. But when the file is opened it may install a virus onto the users hard drive which may delete system files or damage the computer. A worm replicates itself in order to spread to other computers and carry threats which can cause a considerable amount of damage. Threats include damage to the operating system and they allow hackers to gain access to computers which they infect.Spyware and Malware are often installed onto a computer without the users knowledge and record behaviour on the internet. They are sometimes included in programs which you are able to download free from the internet.
  7. Authorized hackers are those which are certified and are allowed to hack into certain computers for reasons such as protecting the country form attack or so on. Unauthorized hackers on the other hand is not certified and is seen as a crime in most countries.
  8. Phishing email messages, phone calls and websites are designed to steal your money. They appear genuine but in reality are not real, but rather want to steal your bank or credit card details.
  9. Identity theft is where an individual impersonates someone usually for a financial gain.Personal information includes security numbers, signatures, addresses, phone numbers and banking and credit card information.So someone who accesses another individual’s personal information is carrying out identity theft.
  10. Encryption is the most effective way to keep data safe. With a secret key or password you are able to decrypt the encryption.
  11. SSL stands for secure sockets layer. This provides customers secure payments by using encryptions across a network.HTTPS also provides encryption across a network but uses authentication as well.PayPal is a safe online payment method which has been recently introduced.