SlideShare uma empresa Scribd logo
1 de 6
Cyber Bullying:
0 The problem is it is increasing because more and more teenagers are
using social media websites such as (Facebook, Twitter, MySpace) This
means more teenagers are being bullied every year due to this.
0 It is a threat because more people are suffering from being bullied every
year. This effects children every year as they don’t want to go out or go
to school because they are afraid.
0 The people who are effected are children, teenagers and sometimes
adults because people are being threatened over the internet.
0 The threat is getting worse as more people are now using the internet
and social media websites.
0 Some solutions to stop this from happening is you could make social
websites have minimum age and add a report button on the websites.
Virus Infection:
0 The problem is your computer can receive a virus by accessing certain e-
mails and going onto unsecure websites.
0 This is a threat because if you have important documents, the virus on
your computer may delete the documents off the hard drive or even
crash the computer.
0 The people who are affected by this are people who have access to a
computer and e-mail.
0 This threat is quite severe because peoples computers get hacked and
people are able to access everything on your computer and even delete
them.
0 You can solve this problem by teaching your children what websites are
safe and what websites are not.
Spam:
0 This is where you get an continuing number of unknown e-mails saying
stuff that is not true, such as: You have won a prize or saying that your
computers virus protector has run out.
0 The problem is increasing because more and more people are believing
it and clicking on the links and then their computer is receiving a virus.
0 The people who are being effected by this are the people who have
access to an e-mail account.
0 The threat is quite bad as more people are believing it and then they are
receiving viruses on their computer.
0 You can solve this problem by telling people about spam and tell them
how to spot spam.
Phishing:
0 Phishing is where people make fake websites in an attempt to scam
people in to getting their important details.
0 The problem is people are getting tricked into thinking that they are on
the correct website but it is a fake then they give the people important
details such as their bank account details.
0 The people who are being effected by this is the people who are going on
to this websites thinking they are real and giving out private
information.
0 The threat is quite bad as people are being effected quite bad by giving
out private information and then in the future getting scammed.
0 You can solve this problem by making people aware of phishing and how
to tell the difference between the real website and the fake website.
Denial Of Service:
0 A denial-of-service attack is an attempt to make a machine or network
resource unavailable to its intended users. Although the means to carry
out, motives for, and targets of a DoS attack may vary, it generally
consists of the efforts of one or more people to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet.
0 This is a threat because if people are trying to use the network or
machine they will not be able to because it will be unavailable.
0 The people that are being effected by this are people who are trying to
use a machine or network resource.
0 The threat is quite bad because people will be unable to use certain
machine or network resources.
0 You can solve this problem by trying to make the machine or network
more secure.

Mais conteúdo relacionado

Mais procurados

Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
Cake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network AggregatorCake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network Aggregatoraatkin1971
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebookShweta Agarwal
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 

Mais procurados (18)

Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network AggregatorCake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network Aggregator
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
IT for Managers
IT for ManagersIT for Managers
IT for Managers
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Twitter terms of service
Twitter terms of serviceTwitter terms of service
Twitter terms of service
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 

Semelhante a Unit 1 - Threats – M2

advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfnisarmca
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 

Semelhante a Unit 1 - Threats – M2 (20)

advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
Facebook
FacebookFacebook
Facebook
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 

Mais de Ryan-Parish

Unit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictUnit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictRyan-Parish
 
Unit 1 - P5 - Twitter
Unit 1 - P5 - TwitterUnit 1 - P5 - Twitter
Unit 1 - P5 - TwitterRyan-Parish
 
Unit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetUnit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetRyan-Parish
 
Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2Ryan-Parish
 
D1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationD1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationRyan-Parish
 
Step by steps unit 3
Step by steps unit 3 Step by steps unit 3
Step by steps unit 3 Ryan-Parish
 
M1 – different ways to connect to a network
M1 – different ways to connect to a networkM1 – different ways to connect to a network
M1 – different ways to connect to a networkRyan-Parish
 
How to install skype
How to install skype   How to install skype
How to install skype Ryan-Parish
 
M3 - how to download norton
M3 - how to download nortonM3 - how to download norton
M3 - how to download nortonRyan-Parish
 
How to install a Wireless NIC
How to install a Wireless NICHow to install a Wireless NIC
How to install a Wireless NICRyan-Parish
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systemsRyan-Parish
 

Mais de Ryan-Parish (13)

Unit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictUnit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ict
 
Unit 1 - P5 - Twitter
Unit 1 - P5 - TwitterUnit 1 - P5 - Twitter
Unit 1 - P5 - Twitter
 
Unit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetUnit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweet
 
Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2
 
D1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationD1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installation
 
Step by steps unit 3
Step by steps unit 3 Step by steps unit 3
Step by steps unit 3
 
M1 – different ways to connect to a network
M1 – different ways to connect to a networkM1 – different ways to connect to a network
M1 – different ways to connect to a network
 
How to install skype
How to install skype   How to install skype
How to install skype
 
M3 - how to download norton
M3 - how to download nortonM3 - how to download norton
M3 - how to download norton
 
How to install a Wireless NIC
How to install a Wireless NICHow to install a Wireless NIC
How to install a Wireless NIC
 
P3 - data flow
P3  - data flowP3  - data flow
P3 - data flow
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
 
P1 – Unit 3
P1 – Unit 3P1 – Unit 3
P1 – Unit 3
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Unit 1 - Threats – M2

  • 1.
  • 2. Cyber Bullying: 0 The problem is it is increasing because more and more teenagers are using social media websites such as (Facebook, Twitter, MySpace) This means more teenagers are being bullied every year due to this. 0 It is a threat because more people are suffering from being bullied every year. This effects children every year as they don’t want to go out or go to school because they are afraid. 0 The people who are effected are children, teenagers and sometimes adults because people are being threatened over the internet. 0 The threat is getting worse as more people are now using the internet and social media websites. 0 Some solutions to stop this from happening is you could make social websites have minimum age and add a report button on the websites.
  • 3. Virus Infection: 0 The problem is your computer can receive a virus by accessing certain e- mails and going onto unsecure websites. 0 This is a threat because if you have important documents, the virus on your computer may delete the documents off the hard drive or even crash the computer. 0 The people who are affected by this are people who have access to a computer and e-mail. 0 This threat is quite severe because peoples computers get hacked and people are able to access everything on your computer and even delete them. 0 You can solve this problem by teaching your children what websites are safe and what websites are not.
  • 4. Spam: 0 This is where you get an continuing number of unknown e-mails saying stuff that is not true, such as: You have won a prize or saying that your computers virus protector has run out. 0 The problem is increasing because more and more people are believing it and clicking on the links and then their computer is receiving a virus. 0 The people who are being effected by this are the people who have access to an e-mail account. 0 The threat is quite bad as more people are believing it and then they are receiving viruses on their computer. 0 You can solve this problem by telling people about spam and tell them how to spot spam.
  • 5. Phishing: 0 Phishing is where people make fake websites in an attempt to scam people in to getting their important details. 0 The problem is people are getting tricked into thinking that they are on the correct website but it is a fake then they give the people important details such as their bank account details. 0 The people who are being effected by this is the people who are going on to this websites thinking they are real and giving out private information. 0 The threat is quite bad as people are being effected quite bad by giving out private information and then in the future getting scammed. 0 You can solve this problem by making people aware of phishing and how to tell the difference between the real website and the fake website.
  • 6. Denial Of Service: 0 A denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. 0 This is a threat because if people are trying to use the network or machine they will not be able to because it will be unavailable. 0 The people that are being effected by this are people who are trying to use a machine or network resource. 0 The threat is quite bad because people will be unable to use certain machine or network resources. 0 You can solve this problem by trying to make the machine or network more secure.