SlideShare a Scribd company logo
1 of 6
Cyber Bullying:
0 The problem is it is increasing because more and more teenagers are
using social media websites such as (Facebook, Twitter, MySpace) This
means more teenagers are being bullied every year due to this.
0 It is a threat because more people are suffering from being bullied every
year. This effects children every year as they don’t want to go out or go
to school because they are afraid.
0 The people who are effected are children, teenagers and sometimes
adults because people are being threatened over the internet.
0 The threat is getting worse as more people are now using the internet
and social media websites.
0 Some solutions to stop this from happening is you could make social
websites have minimum age and add a report button on the websites.
Virus Infection:
0 The problem is your computer can receive a virus by accessing certain e-
mails and going onto unsecure websites.
0 This is a threat because if you have important documents, the virus on
your computer may delete the documents off the hard drive or even
crash the computer.
0 The people who are affected by this are people who have access to a
computer and e-mail.
0 This threat is quite severe because peoples computers get hacked and
people are able to access everything on your computer and even delete
them.
0 You can solve this problem by teaching your children what websites are
safe and what websites are not.
Spam:
0 This is where you get an continuing number of unknown e-mails saying
stuff that is not true, such as: You have won a prize or saying that your
computers virus protector has run out.
0 The problem is increasing because more and more people are believing
it and clicking on the links and then their computer is receiving a virus.
0 The people who are being effected by this are the people who have
access to an e-mail account.
0 The threat is quite bad as more people are believing it and then they are
receiving viruses on their computer.
0 You can solve this problem by telling people about spam and tell them
how to spot spam.
Phishing:
0 Phishing is where people make fake websites in an attempt to scam
people in to getting their important details.
0 The problem is people are getting tricked into thinking that they are on
the correct website but it is a fake then they give the people important
details such as their bank account details.
0 The people who are being effected by this is the people who are going on
to this websites thinking they are real and giving out private
information.
0 The threat is quite bad as people are being effected quite bad by giving
out private information and then in the future getting scammed.
0 You can solve this problem by making people aware of phishing and how
to tell the difference between the real website and the fake website.
Denial Of Service:
0 A denial-of-service attack is an attempt to make a machine or network
resource unavailable to its intended users. Although the means to carry
out, motives for, and targets of a DoS attack may vary, it generally
consists of the efforts of one or more people to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet.
0 This is a threat because if people are trying to use the network or
machine they will not be able to because it will be unavailable.
0 The people that are being effected by this are people who are trying to
use a machine or network resource.
0 The threat is quite bad because people will be unable to use certain
machine or network resources.
0 You can solve this problem by trying to make the machine or network
more secure.

More Related Content

What's hot

Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
Cake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network AggregatorCake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network Aggregatoraatkin1971
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebookShweta Agarwal
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 

What's hot (19)

Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network AggregatorCake - An Ethereum Powered Social Network Aggregator
Cake - An Ethereum Powered Social Network Aggregator
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
IT for Managers
IT for ManagersIT for Managers
IT for Managers
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Twitter terms of service
Twitter terms of serviceTwitter terms of service
Twitter terms of service
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 

Similar to Unit 1 - Threats – M2

advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfnisarmca
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 

Similar to Unit 1 - Threats – M2 (20)

advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
Facebook
FacebookFacebook
Facebook
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 

More from Ryan-Parish

Unit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictUnit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictRyan-Parish
 
Unit 1 - P5 - Twitter
Unit 1 - P5 - TwitterUnit 1 - P5 - Twitter
Unit 1 - P5 - TwitterRyan-Parish
 
Unit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetUnit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetRyan-Parish
 
Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2Ryan-Parish
 
D1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationD1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationRyan-Parish
 
Step by steps unit 3
Step by steps unit 3 Step by steps unit 3
Step by steps unit 3 Ryan-Parish
 
M1 – different ways to connect to a network
M1 – different ways to connect to a networkM1 – different ways to connect to a network
M1 – different ways to connect to a networkRyan-Parish
 
How to install skype
How to install skype   How to install skype
How to install skype Ryan-Parish
 
M3 - how to download norton
M3 - how to download nortonM3 - how to download norton
M3 - how to download nortonRyan-Parish
 
How to install a Wireless NIC
How to install a Wireless NICHow to install a Wireless NIC
How to install a Wireless NICRyan-Parish
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systemsRyan-Parish
 

More from Ryan-Parish (13)

Unit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ictUnit 1 - P6 - impact of ict
Unit 1 - P6 - impact of ict
 
Unit 1 - P5 - Twitter
Unit 1 - P5 - TwitterUnit 1 - P5 - Twitter
Unit 1 - P5 - Twitter
 
Unit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweetUnit 1 - P4 – how to tweet
Unit 1 - P4 – how to tweet
 
Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2Unit 7 - Task 3 – P4,P5,M2
Unit 7 - Task 3 – P4,P5,M2
 
D1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installationD1 - virtual desktop and simulated xp installation
D1 - virtual desktop and simulated xp installation
 
Step by steps unit 3
Step by steps unit 3 Step by steps unit 3
Step by steps unit 3
 
M1 – different ways to connect to a network
M1 – different ways to connect to a networkM1 – different ways to connect to a network
M1 – different ways to connect to a network
 
How to install skype
How to install skype   How to install skype
How to install skype
 
M3 - how to download norton
M3 - how to download nortonM3 - how to download norton
M3 - how to download norton
 
How to install a Wireless NIC
How to install a Wireless NICHow to install a Wireless NIC
How to install a Wireless NIC
 
P3 - data flow
P3  - data flowP3  - data flow
P3 - data flow
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
 
P1 – Unit 3
P1 – Unit 3P1 – Unit 3
P1 – Unit 3
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Unit 1 - Threats – M2

  • 1.
  • 2. Cyber Bullying: 0 The problem is it is increasing because more and more teenagers are using social media websites such as (Facebook, Twitter, MySpace) This means more teenagers are being bullied every year due to this. 0 It is a threat because more people are suffering from being bullied every year. This effects children every year as they don’t want to go out or go to school because they are afraid. 0 The people who are effected are children, teenagers and sometimes adults because people are being threatened over the internet. 0 The threat is getting worse as more people are now using the internet and social media websites. 0 Some solutions to stop this from happening is you could make social websites have minimum age and add a report button on the websites.
  • 3. Virus Infection: 0 The problem is your computer can receive a virus by accessing certain e- mails and going onto unsecure websites. 0 This is a threat because if you have important documents, the virus on your computer may delete the documents off the hard drive or even crash the computer. 0 The people who are affected by this are people who have access to a computer and e-mail. 0 This threat is quite severe because peoples computers get hacked and people are able to access everything on your computer and even delete them. 0 You can solve this problem by teaching your children what websites are safe and what websites are not.
  • 4. Spam: 0 This is where you get an continuing number of unknown e-mails saying stuff that is not true, such as: You have won a prize or saying that your computers virus protector has run out. 0 The problem is increasing because more and more people are believing it and clicking on the links and then their computer is receiving a virus. 0 The people who are being effected by this are the people who have access to an e-mail account. 0 The threat is quite bad as more people are believing it and then they are receiving viruses on their computer. 0 You can solve this problem by telling people about spam and tell them how to spot spam.
  • 5. Phishing: 0 Phishing is where people make fake websites in an attempt to scam people in to getting their important details. 0 The problem is people are getting tricked into thinking that they are on the correct website but it is a fake then they give the people important details such as their bank account details. 0 The people who are being effected by this is the people who are going on to this websites thinking they are real and giving out private information. 0 The threat is quite bad as people are being effected quite bad by giving out private information and then in the future getting scammed. 0 You can solve this problem by making people aware of phishing and how to tell the difference between the real website and the fake website.
  • 6. Denial Of Service: 0 A denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. 0 This is a threat because if people are trying to use the network or machine they will not be able to because it will be unavailable. 0 The people that are being effected by this are people who are trying to use a machine or network resource. 0 The threat is quite bad because people will be unable to use certain machine or network resources. 0 You can solve this problem by trying to make the machine or network more secure.