Top Banner
WAYS TO OVERCOME INTERNET THREATS! IDE NTIF YING INT ERNE T THRE ATS AND MIT IGAT ION
12

WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

Jan 13, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

WAY

S TO O

VERCOME

INTE

RNET TH

REATS!

I DE

NT

I FY

I NG

IN

TE

RN

ET

TH

RE

AT

S A

ND

MI T

I GA

TI O

N

Page 2: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

DESCRIPTION

The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.

Page 3: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

Cyber-bullying

THREAT that embarrasses, mistreats or frightens its victim

TYPE OF THREAT

Page 4: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

Cyber-stalking

STALKING people by using Internet and Technology

TYPE OF THREAT

Page 5: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

Identity theft

Someone ILLEGALLY uses your personal information to form an Internet fraud

TYPE OF THREAT

Page 6: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

TYPE OF THREAT

Internet Predator

a.k.a SEXUAL predator on the Internet

Page 7: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

TO PROTECT

YOURSELVES

FROM BEING A VICTIM:-

Page 8: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

MITIGATION

REPORT TO AUTHORIZED PERSONAL TO TAKE ACTION

Page 9: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

ONLY PROVIDE NECESSARY PERSONAL DATA WHEN NEEDED.

MITIGATION

Eg. Sign up for social networking profile.

Page 10: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

MITIGATION

CHECK FOR SECURITY OF THE WEB URL:

“https” is the website that provides secure connection to user

Page 11: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

DO NOT OPEN OR APPROVED ANY POP-UP MESSAGE, SPAM EMAIL AND ETC.

MITIGATION

Page 12: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.

THE ENDFree background music “Relaxing Music ( Instrumental Piano )” download from:-http://www.youtube.com/watch?v=94HYEe1bOFU&ob=

Pictures downloaded from:-http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.htmlhttp://www.womenspress-slo.org/?p=3877http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalkinghttp://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtmlhttp://www1.1citizen.com.my/Logo/Logo_1Citizen.png

Prepared By:-Mohamad Faqrull Izrall Bin Mat FiahMohamd Izazuddin Bin Hassan