+
Internet
Use Issues


             Melisa Naranjo
             Carolina Gonzalez
             Andrés Claro
             María Fernanda Riobó.
+                                                         There is no
                                                       organization that
                                                       controls Internet
                                                         and the Web.




People or organizations
   can easily spread
 information that is not
          true.
                                     This means that
This allows people to create           anyone can
thousands of websites that             create web
contain information that is based,   pages and write
inaccurate or wrong.                 what they want.
• Look for information in different
   websites; if all the sources have the
   same thing, the information is probably
   true.



           +                        • Research in websites that belong to
                                      trusted organizations. For example if the
                                      website address ends in .gov it is the
                                      government website of a country.



• Look at the spelling and grammar of the
  information written. If a website has too
  many spelling mistakes, it is not a reliable
  source of information.
+

There are a lot of websites that contain
offensive or illegal information

To avoid this type of information, some
organizations, schools, governments,
and some parents, use webpage
filtering software.
This software tries to prevent offensive
and illegal information being accessed.
If there is not a filtering software installed
                                      on a computer, people can take steps to
                                            avoid undesirable information:




                 • Don t click the links that are shown in
                   junk email.



 • Use the “safe search” feature on search
+ engines, like Google.



                                         • Think carefully about the keywords that
                                           you use to search with.
Security of Data Transferred
             Using the Internet




       +


To protect information, people should always encrypt
sensitive or personal data that is sent or accessed on a
public network, like the Internet.
To access websites like online shopping or online
banking websites, users need to enter personal
information, including credit card numbers and
social security ID.

                                These websites use encryption to keep
                                information safe, and they are called
                                secure websites.


          +
To identify a secure website:
•The URL (address) should begin with
https://... (normal unsecure websites start
with http://...
•The web browser should show a closed
padlock icon.
•Using a
                                                              firewall: This
 To keep safe information that is                             prevents illegal users
 transferred online people should:                            from accessing a
                                                              network.




•Use digital certificates:
Transactions are digitally signed and      •Install Anti Spyware: Prevents
authenticated when doing online banking.   spyware from accessing a computer and
                                           getting personal information.


 •Using an ID, password or
+
 PIN: The code entered is compared             •Using encryption: Data is
 with the one that is recorded on              scrambled up, and the user must
 system. People must not tell anyone           know a key to unscramble the
 their password, and change it                 information. This prevents people
 frequently. The password should not           from understanding data.
 be easy to guess.
Phishing means sending fraudulent emails to trick people and make them
reveal information about their bank accounts or any online account. Then the
phishers use these personal information to enter the person s bank account
and steal their money.
The emails sent by phishers look very convincing, they have the bank s logo,
and usually send an urgent message to scare people. If someone clicks the
link in the website, they will be sent to a fake bank website. The information
entered by the user would be then used by the phishers to empty the real bank
account.
+
Pharming
Pharming     means      installing   a
malicious code on a computer to
redirect or send to fake websites.
Pharming is similar to phishing, but
instead of deceiving the person, it
deceives the computer. The purpose
of pharming is to get personal details
from people.
When pharming occurs, a person types in a normal URL, but the computer is
tricked to show a fake website that looks authentic. When the person tries to
login the fake website, the username and password are used to steal the
money from the bank account.
It s difficult to detect pharming, because the user doesn t know that
something is not normal in the website.
+
    Spam means sending or receiving junk or
    unsolicited emails: they are sent without being
    asked for. Spam emails usually contain
    advertisements for products.
Spam became a big
problem and it is
estimated that 97% of
all email messages is
spam.

       To prevent spam people
       use email spam filters,
       that separate spam
       messages from normal
       messages.
Bibliography
http://www.igcseict.info/theory/6/internet/index.html
http://mryusuf.com/0417/sites/default/files/S6HackersAndViruses.pdf

More Related Content

PPTX
Internet Safety & Privacy
PPTX
How To Keep the Grinch From Ruining Your Cyber Monday
DOCX
Online secuirty
PPTX
Phishing
PPTX
Internet issues
DOCX
Identity theft in the internet
PDF
Phishing & Cyber Attack Awareness
PDF
Identity Theft: Evolving with Technology
Internet Safety & Privacy
How To Keep the Grinch From Ruining Your Cyber Monday
Online secuirty
Phishing
Internet issues
Identity theft in the internet
Phishing & Cyber Attack Awareness
Identity Theft: Evolving with Technology

What's hot (20)

PPTX
Phishing--The Entire Story of a Dark World
PPTX
Phishing ppt
PPTX
Digital privacy
PPT
Phishing
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PDF
Log Out Cyber Awareness
PPTX
secure from Phishing Hacking and Keylogger
PDF
PPTX
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
PDF
Being Cyber Aware
PPT
Ict Phishing (Present)
PDF
Is Crawling Legal? Web Crawling legal Policies
PPT
PPT
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
PPT
Strategies to handle Phishing attacks
PPTX
Phishing
PPTX
Phishing attack till now
PPT
Phishing
PPTX
Anti phishing
DOCX
Cybercrime blog
Phishing--The Entire Story of a Dark World
Phishing ppt
Digital privacy
Phishing
Phishing attack, with SSL Encryption and HTTPS Working
Log Out Cyber Awareness
secure from Phishing Hacking and Keylogger
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Being Cyber Aware
Ict Phishing (Present)
Is Crawling Legal? Web Crawling legal Policies
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Strategies to handle Phishing attacks
Phishing
Phishing attack till now
Phishing
Anti phishing
Cybercrime blog
Ad

Viewers also liked (7)

PPTX
Issue with Internet in college (Computer Security and Cyber Law)
PPTX
Public/Private Cooperation on Internet Issues: The Irish Experience
PPTX
Internet Issues (How to Deal on Internet Security)
PPT
Internet Law: An Expedition
PPTX
Emerging telecommunication technologies
PPTX
Legal issues of the Internet of Things
PPT
Evolution Of Telecommunication
Issue with Internet in college (Computer Security and Cyber Law)
Public/Private Cooperation on Internet Issues: The Irish Experience
Internet Issues (How to Deal on Internet Security)
Internet Law: An Expedition
Emerging telecommunication technologies
Legal issues of the Internet of Things
Evolution Of Telecommunication
Ad

Similar to Internet use issues (20)

PPTX
Chp-15 Cyber Safety ppt-std 11.pptx
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Internet Use Issues.pptx
PPTX
Internet Security
PPTX
Computer and internet fraud
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
Internet safety and security
PPTX
Cyber security-1.pptx
PPTX
Data protection and security
PPTX
A delightful way to teach kids about computers
PDF
Chapter 4 E-Safety and Health & Safety
PPTX
CyberSecurity - Computers In Libraries 2024
PDF
Securing and Safeguarding Your Library Setup
PPTX
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
PPTX
Cyber Crime
PPTX
Day 2
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
Cyber Safety ppt.pptx
PPTX
Beginners guide to the internet 26.10.15
PPTX
Beginners guide to the internet 26.10.15 & 30.10.15
Chp-15 Cyber Safety ppt-std 11.pptx
TheCyberThreatAndYou2_deck.pptx
Internet Use Issues.pptx
Internet Security
Computer and internet fraud
Rules of Netiquette Empowerment Technologies Lesson
Internet safety and security
Cyber security-1.pptx
Data protection and security
A delightful way to teach kids about computers
Chapter 4 E-Safety and Health & Safety
CyberSecurity - Computers In Libraries 2024
Securing and Safeguarding Your Library Setup
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cyber Crime
Day 2
Rayane hazimeh building trust in the digital age teenagers and students
Cyber Safety ppt.pptx
Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15 & 30.10.15

Recently uploaded (20)

PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
The AI Revolution in Customer Service - 2025
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Examining Bias in AI Generated News Content.pdf
PDF
substrate PowerPoint Presentation basic one
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
giants, standing on the shoulders of - by Daniel Stenberg
Build automations faster and more reliably with UiPath ScreenPlay
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
SGT Report The Beast Plan and Cyberphysical Systems of Control
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Internet of Everything -Basic concepts details
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Module 1 Introduction to Web Programming .pptx
A symptom-driven medical diagnosis support model based on machine learning te...
Electrocardiogram sequences data analytics and classification using unsupervi...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
The AI Revolution in Customer Service - 2025
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Examining Bias in AI Generated News Content.pdf
substrate PowerPoint Presentation basic one
NewMind AI Weekly Chronicles – August ’25 Week IV
giants, standing on the shoulders of - by Daniel Stenberg

Internet use issues

  • 1. + Internet Use Issues Melisa Naranjo Carolina Gonzalez Andrés Claro María Fernanda Riobó.
  • 2. + There is no organization that controls Internet and the Web. People or organizations can easily spread information that is not true. This means that This allows people to create anyone can thousands of websites that create web contain information that is based, pages and write inaccurate or wrong. what they want.
  • 3. • Look for information in different websites; if all the sources have the same thing, the information is probably true. + • Research in websites that belong to trusted organizations. For example if the website address ends in .gov it is the government website of a country. • Look at the spelling and grammar of the information written. If a website has too many spelling mistakes, it is not a reliable source of information.
  • 4. + There are a lot of websites that contain offensive or illegal information To avoid this type of information, some organizations, schools, governments, and some parents, use webpage filtering software. This software tries to prevent offensive and illegal information being accessed.
  • 5. If there is not a filtering software installed on a computer, people can take steps to avoid undesirable information: • Don t click the links that are shown in junk email. • Use the “safe search” feature on search + engines, like Google. • Think carefully about the keywords that you use to search with.
  • 6. Security of Data Transferred Using the Internet + To protect information, people should always encrypt sensitive or personal data that is sent or accessed on a public network, like the Internet.
  • 7. To access websites like online shopping or online banking websites, users need to enter personal information, including credit card numbers and social security ID. These websites use encryption to keep information safe, and they are called secure websites. + To identify a secure website: •The URL (address) should begin with https://... (normal unsecure websites start with http://... •The web browser should show a closed padlock icon.
  • 8. •Using a firewall: This To keep safe information that is prevents illegal users transferred online people should: from accessing a network. •Use digital certificates: Transactions are digitally signed and •Install Anti Spyware: Prevents authenticated when doing online banking. spyware from accessing a computer and getting personal information. •Using an ID, password or + PIN: The code entered is compared •Using encryption: Data is with the one that is recorded on scrambled up, and the user must system. People must not tell anyone know a key to unscramble the their password, and change it information. This prevents people frequently. The password should not from understanding data. be easy to guess.
  • 9. Phishing means sending fraudulent emails to trick people and make them reveal information about their bank accounts or any online account. Then the phishers use these personal information to enter the person s bank account and steal their money. The emails sent by phishers look very convincing, they have the bank s logo, and usually send an urgent message to scare people. If someone clicks the link in the website, they will be sent to a fake bank website. The information entered by the user would be then used by the phishers to empty the real bank account.
  • 10. + Pharming Pharming means installing a malicious code on a computer to redirect or send to fake websites. Pharming is similar to phishing, but instead of deceiving the person, it deceives the computer. The purpose of pharming is to get personal details from people.
  • 11. When pharming occurs, a person types in a normal URL, but the computer is tricked to show a fake website that looks authentic. When the person tries to login the fake website, the username and password are used to steal the money from the bank account. It s difficult to detect pharming, because the user doesn t know that something is not normal in the website.
  • 12. + Spam means sending or receiving junk or unsolicited emails: they are sent without being asked for. Spam emails usually contain advertisements for products. Spam became a big problem and it is estimated that 97% of all email messages is spam. To prevent spam people use email spam filters, that separate spam messages from normal messages.