1 / 12

Ways to overcome internet threats!

Ways to overcome internet threats!. Identifying internet threats and mitigation. Description.

powa
Download Presentation

Ways to overcome internet threats!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ways to overcome internet threats! Identifying internet threats and mitigation

  2. Description • The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.

  3. Type of threat Cyber-bullying THREATthat embarrasses, mistreats or frightens its victim

  4. Type of threat Cyber-stalking STALKING people by using Internet and Technology

  5. Type of threat Identity theft Someone ILLEGALLYuses your personal information to form an Internet fraud

  6. Type of threat Internet Predator a.k.aSEXUALpredator on the Internet

  7. To protect YOURSELVESfrom being a victim:-

  8. mitigation Report to authorized personal to take action

  9. mitigation Only provide necessary personal data when needed. Eg. Sign up for social networking profile.

  10. mitigation Check for security of the web url: “https” is the website that provides secure connection to user

  11. mitigation Do not open or approved any pop-up message, spam email and etc.

  12. THE END Free background music “Relaxing Music ( Instrumental Piano )” download from:- http://www.youtube.com/watch?v=94HYEe1bOFU&ob= Pictures downloaded from:- http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.html http://www.womenspress-slo.org/?p=3877 http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalking http://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/ http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtml http://www1.1citizen.com.my/Logo/Logo_1Citizen.png Prepared By:- MohamadFaqrullIzrall Bin Mat Fiah MohamdIzazuddin Bin Hassan

More Related