ways to overcome internet threats! identifying internet threats and mitigation

12
WAYS TO OVERCOME INTERNET THREATS! IDE NTIF YING INT ERNE T THRE ATS AND MIT IGAT ION

Upload: brett-williamson

Post on 13-Jan-2016

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

WAY

S TO O

VERCOME

INTE

RNET TH

REATS!

I DE

NT

I FY

I NG

IN

TE

RN

ET

TH

RE

AT

S A

ND

MI T

I GA

TI O

N

Page 2: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

DESCRIPTION

The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.

Page 3: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

Cyber-bullying

THREAT that embarrasses, mistreats or frightens its victim

TYPE OF THREAT

Page 4: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

Cyber-stalking

STALKING people by using Internet and Technology

TYPE OF THREAT

Page 5: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

Identity theft

Someone ILLEGALLY uses your personal information to form an Internet fraud

TYPE OF THREAT

Page 6: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

TYPE OF THREAT

Internet Predator

a.k.a SEXUAL predator on the Internet

Page 7: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

TO PROTECT

YOURSELVES

FROM BEING A VICTIM:-

Page 8: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

MITIGATION

REPORT TO AUTHORIZED PERSONAL TO TAKE ACTION

Page 9: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

ONLY PROVIDE NECESSARY PERSONAL DATA WHEN NEEDED.

MITIGATION

Eg. Sign up for social networking profile.

Page 10: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

MITIGATION

CHECK FOR SECURITY OF THE WEB URL:

“https” is the website that provides secure connection to user

Page 11: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

DO NOT OPEN OR APPROVED ANY POP-UP MESSAGE, SPAM EMAIL AND ETC.

MITIGATION

Page 12: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION

THE ENDFree background music “Relaxing Music ( Instrumental Piano )” download from:-http://www.youtube.com/watch?v=94HYEe1bOFU&ob=

Pictures downloaded from:-http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.htmlhttp://www.womenspress-slo.org/?p=3877http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalkinghttp://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtmlhttp://www1.1citizen.com.my/Logo/Logo_1Citizen.png

Prepared By:-Mohamad Faqrull Izrall Bin Mat FiahMohamd Izazuddin Bin Hassan