1 / 14

1Citizen Portfolio

1Citizen Portfolio. Prepared by: Nor Shairah Aina bt Mohd Saed Student id: 2009431006 Prepared for: Puan Zurita. e-Safety. What is e-Safety? -Internet safety is more on how to protect your important information from internet threat. Internet Dangers

rowena
Download Presentation

1Citizen Portfolio

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 1Citizen Portfolio Prepared by: Nor ShairahAinabtMohdSaed Student id: 2009431006 Prepared for: PuanZurita

  2. e-Safety • What is e-Safety? -Internet safety is more on how to protect your important information from internet threat.

  3. Internet Dangers i) Internet threats can come in various forms of attack. ii) The internet can create the illusion that strangers are actually friends. iii) The internet can damage your reputation.

  4. Example of e-Safety • Identity theft -Occurs when someone uses your personal information such as name, address or financial information for their own interests. -The thieves can make purchases when they have access to your personal information by using your own credit card. -The effect of identity theft is that you have lose your financial and can be wrongly involve with criminal activities that they never commit.

  5. Hacker -Is a person who enjoys learning and expert in programming languages and computer systems . -They share the information that they find with others but they have no intention to interfere with the system or to get other’s information. • Cracker -Is a person who is illegally accessed to someone else’s system and have the intention to distribute malicious software.

  6. Cyber Bullying -Is a form of cyber threat that embarrasses or frighten its victim. It will give mental and emotional disoders to the victims.

  7. Cyberstalking -The use of internet or any electronic device to stalk other people in internet. -Cyber stalkers find the information about their victim from blogs,search services or any social networking websites. - When use the internet, keep secure our personal information and don’t expose it to others. For example, don’t use real name when communicating in chat rooms. Besides, don’t use user name that will reveal our real gender especially for women.

  8. e-Rule • What is e-Rule? -Describe the legal issues pertaining the communicative, transactional and distributive aspects of networked information technologies and devies.

  9. Cyber Crime • Is also known as computer crime, digital crime, e-crime and electronic crime. All of these crimes indicate that the crimes are committed through the use of technology. • Computers are used to intimidate people, commit fraud and steal information. • With the advance of computer technology, many people use computers for personal purposes and become more exposed to the dangers of cyber crime. This phenomenon have threatens the security of individuals and entire nations.

  10. Examples of cyber crime: i) Internet banking fraud -Is a theft committed using online technology to illegally remove money from, or transfer into a different account. - Internet banking fraud include phishing and mule recruitment.

  11. Reasons of Cyber Crimes -To gain reputation for intelligence or brilliance. - For financial means - For revenge to someone they hate. - Some form of protest. - To steal someone’s identity or identity theft.

  12. Effects of cyber crime - It can contribute to severe losses such as money, time, productivity and reputation.

More Related