ways to overcome internet threats
Download
Skip this Video
Download Presentation
Ways to overcome internet threats!

Loading in 2 Seconds...

play fullscreen
1 / 12

Ways to overcome internet threats! - PowerPoint PPT Presentation


  • 81 Views
  • Uploaded on

Ways to overcome internet threats!. Identifying internet threats and mitigation. Description.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Ways to overcome internet threats!' - powa


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
ways to overcome internet threats

Ways to overcome internet threats!

Identifying internet threats and mitigation

description
Description
  • The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.
type of threat
Type of threat

Cyber-bullying

THREATthat embarrasses,

mistreats or frightens its victim

type of threat1
Type of threat

Cyber-stalking

STALKING people by using

Internet and Technology

type of threat2
Type of threat

Identity theft

Someone ILLEGALLYuses your personal information to form an Internet fraud

type of threat3
Type of threat

Internet

Predator

a.k.aSEXUALpredator on the Internet

only provide necessary personal data when needed

mitigation

Only provide necessary personal data when needed.

Eg. Sign up for social networking profile.

check for security of the web url

mitigation

Check for security of the web url:

“https” is the website that provides secure connection to user

the end
THE END

Free background music “Relaxing Music ( Instrumental Piano )” download from:-

http://www.youtube.com/watch?v=94HYEe1bOFU&ob=

Pictures downloaded from:-

http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.html

http://www.womenspress-slo.org/?p=3877

http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalking

http://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/

http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtml

http://www1.1citizen.com.my/Logo/Logo_1Citizen.png

Prepared By:-

MohamadFaqrullIzrall Bin Mat Fiah

MohamdIzazuddin Bin Hassan

ad