Ways to overcome internet threats
Download
1 / 12

Ways to overcome internet threats! - PowerPoint PPT Presentation


  • 81 Views
  • Uploaded on

Ways to overcome internet threats!. Identifying internet threats and mitigation. Description.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Ways to overcome internet threats!' - powa


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Ways to overcome internet threats

Ways to overcome internet threats!

Identifying internet threats and mitigation


Description
Description

  • The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.


Type of threat
Type of threat

Cyber-bullying

THREATthat embarrasses,

mistreats or frightens its victim


Type of threat1
Type of threat

Cyber-stalking

STALKING people by using

Internet and Technology


Type of threat2
Type of threat

Identity theft

Someone ILLEGALLYuses your personal information to form an Internet fraud


Type of threat3
Type of threat

Internet

Predator

a.k.aSEXUALpredator on the Internet


To protect yourselves from being a victim
To protect YOURSELVESfrom being a victim:-


Report to authorized personal to take action

mitigation

Report to authorized personal to take action


Only provide necessary personal data when needed

mitigation

Only provide necessary personal data when needed.

Eg. Sign up for social networking profile.


Check for security of the web url

mitigation

Check for security of the web url:

“https” is the website that provides secure connection to user


Do not open or approved any pop up message spam email and etc

mitigation

Do not open or approved any pop-up message, spam email and etc.


The end
THE END

Free background music “Relaxing Music ( Instrumental Piano )” download from:-

http://www.youtube.com/watch?v=94HYEe1bOFU&ob=

Pictures downloaded from:-

http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.html

http://www.womenspress-slo.org/?p=3877

http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalking

http://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/

http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtml

http://www1.1citizen.com.my/Logo/Logo_1Citizen.png

Prepared By:-

MohamadFaqrullIzrall Bin Mat Fiah

MohamdIzazuddin Bin Hassan


ad