TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
negative implications of IT
1. Mahdi Rahmani 40113290
M2 – Describe the negative implications of IT on Social Communication
Report – describe cyber bullying, spam, hacking, virus, phishing,
suggest protection mechanism.
Impact of IT - M2
How can IT impact individuals, what are negative implication –
explain and describe cyber bullying, spam, hacking, virus, phishing –
what all this means and what are the implication for users, what are
the safety measures one need to take to protect and observe.
• Cyber bullying
• Spam
• Phishing
• Denial of service
In M2 task I’mgoingto explainpointbypointof negativeimpactof ITon social communication.
Firstly,goingtoexplaincyberbullyingonITand whatis cyberbullying.
• Cyber bullying
Cyberbullying may vary fromhumiliating or offensiveblog posts or video
photos, to cyber-attacks, criticism and derogatory remarks, to hacking via
newsletters, blogs, social networking channels and text messages.
Growing age demographic is proneto cyberbullying butrising perpetrators are
teens and young adults. cyberbullying is a increasing issuein schools that has
becomes a concern because the internet is relatively private, which leads to
abusers because it is impossibleto track their harassment. Unfortunately,
theories, warnings and photographs can quite easily be disseminated online.
How we can help this people againstcyber bullying?
Firstly, wehave to keep all records of any online activity like Emails, Web
pages, social media posts,
Including relevantdates and times. Keep both an electronic version and a
printed copy of each document,
2. Mahdi Rahmani 40113290
• Spam
What is Spam?
Spamemail. Such unwanted spam notifications that we consider cluttering our
inboxes, are a challenge for internet users, business and politicians alike.
Estimates vary but somesuggestthat more than 100 billion spam messages
are sent per day, reflecting as much as 85 percent of the total global email
traffic. As you in our email list we haveone box called junk email which is
means spam or some email come from someone we don’tknow who is it and
wherecome from.
How could protect yourself from spam?
1. Think before click on any email.
2. Downloading anti-spam.
3. don’treplay to spam massage.
3. Mahdi Rahmani 40113290
• Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as
username. Password and bank details by disgusting oneself as trustworthy
ideally in an electronic communication. It’s so important to know how to
protect your details from this people sometime we open some link we
don’tknow where come from especially some web they don’thave https
These webs are not safe to put your details or shopping via your credit
card.
Common features of phishing email.
1. Too good to be true
Phishing designed to attract people’s attention immediately. Like a
lottery when you see it in advertising and best way to stay protect
don’tgo for any email or advertising.
2. Hyperlinks
By changing some words, they can drag you to click in any link
that they want.
3. Attachments
When you see an attachment in an email that you didn't anticipate
or that makes no sense, don't open it! They also bear payloads such
as malware, or other viruses.
Look at this example of phishing.
4. Mahdi Rahmani 40113290
Four steps to protect yourself from phishing.
1.protectyour pc by using security software.
2.protectyour phone by setting softwareto update automatically.
3.protectyour account by using multi-factor authentication. Like
getting messagewhen you sign your account.
4.protectyour data by backing up.
Putting your data into external hard drive.
5. Mahdi Rahmani 40113290
Denial of service
Is method of attacking a networked computer by sending it an abnormally
high number of requests, causing its network to slow down or fail. Since a
single individual cannot generate enough traffic for a dos attack, these
attacks are usually run from multiple computers infected by worms or
computer for a dos.
How does a DOS Attack work?
Always Dos attackers they working together to attack the webs or pages to
load this website and stop it for while or forever. Even they can attack
computers and all that means shut down our machine or web.
How we can preventDos attack?
1. Buy more bandwidth.
2. Build redundancy into your infrastructure.
3. Configure your network hardware against Dos attacks.
4. Deploy anti-Dos hardware and software.
5. Deploy a Dos protection appliance.
6. Protect your DNS servers.
Finely to protect your computer there are a range of protection steps people
and organisation may take to securetheir data and protect computer networks
6. Mahdi Rahmani 40113290
and service, such as encryption , firewalls , anti-virus, anti-spyware, passwords,
backups and biometric authentication.