1 / 14

MOHD FAUZI BIN AHMAD MOHD FIRDAUS BIN ZULKIFLI

Presented by :. MOHD FAUZI BIN AHMAD MOHD FIRDAUS BIN ZULKIFLI. CiTiZEN. e-Rule. Cyber Crime. When it comes to our PC or Network, we need to ask ourself the following questions.

stew
Download Presentation

MOHD FAUZI BIN AHMAD MOHD FIRDAUS BIN ZULKIFLI

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented by : MOHD FAUZI BIN AHMAD MOHD FIRDAUS BIN ZULKIFLI

  2. CiTiZEN

  3. e-Rule Cyber Crime

  4. When it comes to our PC or Network, we need to ask ourself the following questions. • Would you like to have yourself, organization, corporation or business responsible for cyber-crime, without you knowing? • Would you like to be prosecuted for something you did not do? • Would you like to be sued for privacy violations? • Would you like to be the base of operations for major crime? • Would you like to become another survey statistics? • Would you like to loose clients due to lack of public confidence in your Information Technology system? • Would you like to be the VICTIM?

  5. So how are criminals committing the crimes? • Wireless networking technology poses the biggest problem, as an unsecured network can be hacked from someone outside using a simple radio antenna, PDA or cell phone. • Password Crackers (Software designed to decrypt passwords, so they can gain access) • Network Scanning software that looks for open ports to gain access to a network (software or hardware based) • Illegitimate Websites (fake URLs), to lure you into giving information over the web or even hack an un-patched (updated) system • SPAM (used to get email lists to possibly cause more damage)

  6. What is the Effect? Loss Of Revenue Wasted Time Damaged Reputations Reduced Productivity

  7. e-Safety Internet Dangers FAKE!!

  8. FAKE!!

  9. REAL

  10. Other Fake Site http://www.may2u-malaysia.com/May-Bank-Online.htmhttp://www.online-may2younet.com/May-Bank-Online.htmhttp://www.may2u-securednet.com/Maybank2u.htmhttp://www.mayberhad-verifications.com/May-Bank-Online.htmhttp://www.may2u-onlineprotections.com/Maybank2u.htmhttp://www.may2u-newnet-securities.com/Maybank2u.htmhttp://www.may2u-newupdates.com/Maybank2u-Online.htmhttp://www.may2u-newsolutions.com/Maybank2u-Online.htmhttp://marchantschmidt.com/photos/mainn/Maybank2u_com.htmlhttp://210.217.236.12/wmaster/pop/mayredi.htmlhttp://chrysantheme.guilde.free.fr/phpraider//authentication/smf/mbb_login.htmhttp://lordsofexodar.free.fr//images/mbb_login.htm

  11. e-CARE ErgonomicS

  12. Right Way

  13. Why is ergonomics important? Here are some examples of problems that can result from improper ergonomic positions over time : • carpal tunnel syndrome, resulting from repetitive tasks, such as clicking the mouse  • neck and shoulder soreness resulting from having a computer monitor too low below eye level, so the head leans down to see it. **Although these may not sound like serious problems, poor ergonomic positioning actually causes a lot of injuries in the workplace every day.

  14. THANK YOU!!

More Related