SlideShare a Scribd company logo
Mahdi Rahmani 40113290
M2 – Describe the negative implications of IT on Social Communication
Report – describe cyber bullying, spam, hacking, virus, phishing,
suggest protection mechanism.
Impact of IT - M2
How can IT impact individuals, what are negative implication –
explain and describe cyber bullying, spam, hacking, virus, phishing –
what all this means and what are the implication for users, what are
the safety measures one need to take to protect and observe.
 • Cyber bullying
 • Spam
 • Phishing
 • Denial of service
In M2 task I’mgoingto explainpointbypointof negativeimpactof ITon social communication.
Firstly,goingtoexplaincyberbullyingonITand whatis cyberbullying.
• Cyber bullying
Cyberbullying may vary fromhumiliating or offensiveblog posts or video
photos, to cyber-attacks, criticism and derogatory remarks, to hacking via
newsletters, blogs, social networking channels and text messages.
Growing age demographic is proneto cyberbullying butrising perpetrators are
teens and young adults. cyberbullying is a increasing issuein schools that has
becomes a concern because the internet is relatively private, which leads to
abusers because it is impossibleto track their harassment. Unfortunately,
theories, warnings and photographs can quite easily be disseminated online.
How we can help this people againstcyber bullying?
Firstly, wehave to keep all records of any online activity like Emails, Web
pages, social media posts,
Including relevantdates and times. Keep both an electronic version and a
printed copy of each document,
Mahdi Rahmani 40113290
• Spam
What is Spam?
Spamemail. Such unwanted spam notifications that we consider cluttering our
inboxes, are a challenge for internet users, business and politicians alike.
Estimates vary but somesuggestthat more than 100 billion spam messages
are sent per day, reflecting as much as 85 percent of the total global email
traffic. As you in our email list we haveone box called junk email which is
means spam or some email come from someone we don’tknow who is it and
wherecome from.
How could protect yourself from spam?
1. Think before click on any email.
2. Downloading anti-spam.
3. don’treplay to spam massage.
Mahdi Rahmani 40113290
• Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as
username. Password and bank details by disgusting oneself as trustworthy
ideally in an electronic communication. It’s so important to know how to
protect your details from this people sometime we open some link we
don’tknow where come from especially some web they don’thave https
These webs are not safe to put your details or shopping via your credit
card.
Common features of phishing email.
1. Too good to be true
Phishing designed to attract people’s attention immediately. Like a
lottery when you see it in advertising and best way to stay protect
don’tgo for any email or advertising.
2. Hyperlinks
By changing some words, they can drag you to click in any link
that they want.
3. Attachments
When you see an attachment in an email that you didn't anticipate
or that makes no sense, don't open it! They also bear payloads such
as malware, or other viruses.
Look at this example of phishing.
Mahdi Rahmani 40113290
Four steps to protect yourself from phishing.
1.protectyour pc by using security software.
2.protectyour phone by setting softwareto update automatically.
3.protectyour account by using multi-factor authentication. Like
getting messagewhen you sign your account.
4.protectyour data by backing up.
Putting your data into external hard drive.
Mahdi Rahmani 40113290
Denial of service
Is method of attacking a networked computer by sending it an abnormally
high number of requests, causing its network to slow down or fail. Since a
single individual cannot generate enough traffic for a dos attack, these
attacks are usually run from multiple computers infected by worms or
computer for a dos.
How does a DOS Attack work?
Always Dos attackers they working together to attack the webs or pages to
load this website and stop it for while or forever. Even they can attack
computers and all that means shut down our machine or web.
How we can preventDos attack?
1. Buy more bandwidth.
2. Build redundancy into your infrastructure.
3. Configure your network hardware against Dos attacks.
4. Deploy anti-Dos hardware and software.
5. Deploy a Dos protection appliance.
6. Protect your DNS servers.
Finely to protect your computer there are a range of protection steps people
and organisation may take to securetheir data and protect computer networks
Mahdi Rahmani 40113290
and service, such as encryption , firewalls , anti-virus, anti-spyware, passwords,
backups and biometric authentication.

More Related Content

PPT
Internet safety v 4 slides and notes
PDF
Cybersecurity Awareness Infographics
PPTX
Computer Project on Cyber Safety
PDF
Internet Safety Glossary of Terms
PDF
Edu 03 assingment
PPTX
Presentation on cyber safety
PPTX
Internet safety
PPTX
Cybersecurity Awareness
Internet safety v 4 slides and notes
Cybersecurity Awareness Infographics
Computer Project on Cyber Safety
Internet Safety Glossary of Terms
Edu 03 assingment
Presentation on cyber safety
Internet safety
Cybersecurity Awareness

What's hot (18)

PPTX
Cyber safety 101
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
Cyber security
PPTX
Cyber security tips in Banking in Nepal
PPTX
Phishing - A modern web attack
PPTX
Ao4 powerpoint mrs hussain
PPTX
Online safety, security, and ethics
PDF
Cybersecurity Awareness Posters - Set #2
PPTX
Phishing Attacks
PDF
CDSE Cybsecurity Awareness Posters
PPTX
Phishing technology
PDF
14 tips to increase cybersecurity awareness
PPTX
Email phishing and countermeasures
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PDF
Phishing exposed
PPTX
Phishing
PPTX
Disadvantages of-i ct-woww
Cyber safety 101
Phishing Scams: 8 Helpful Tips to Keep You Safe
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Cyber security
Cyber security tips in Banking in Nepal
Phishing - A modern web attack
Ao4 powerpoint mrs hussain
Online safety, security, and ethics
Cybersecurity Awareness Posters - Set #2
Phishing Attacks
CDSE Cybsecurity Awareness Posters
Phishing technology
14 tips to increase cybersecurity awareness
Email phishing and countermeasures
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Phishing exposed
Phishing
Disadvantages of-i ct-woww
Ad

Similar to negative implications of IT (20)

PPTX
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
PPTX
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
PPTX
Cyber Crime and Social Media Security
PDF
Cybercrime - An essential guide from Thawte
PPTX
2nd Class PPT.pptx
PPTX
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
PPT
Cyber-Security-20211013105857.ppt
PDF
Computer 10: Lesson 10 - Online Crimes and Hazards
PDF
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
PPTX
Cyber Safety and cyber security. Safety measures towards computer networks a...
PDF
Week3-CyberSecurity 8th Semester important.pdf
DOCX
THESIS-2(2)
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
Cyber crime.pptx
PDF
Computer Security for Lawyers
PDF
Cybersecurity - Webinar Session
PPTX
The Major Types of Cybercrime
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PPTX
Copy of policing the internet_040555.pptx
PDF
Digital EMPOWERMENT.pdf for atudents for digital
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
Cyber Crime and Social Media Security
Cybercrime - An essential guide from Thawte
2nd Class PPT.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
Cyber-Security-20211013105857.ppt
Computer 10: Lesson 10 - Online Crimes and Hazards
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
Cyber Safety and cyber security. Safety measures towards computer networks a...
Week3-CyberSecurity 8th Semester important.pdf
THESIS-2(2)
Online-Safety-Security-and-etiquette.pptx
Cyber crime.pptx
Computer Security for Lawyers
Cybersecurity - Webinar Session
The Major Types of Cybercrime
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Copy of policing the internet_040555.pptx
Digital EMPOWERMENT.pdf for atudents for digital
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MYSQL Presentation for SQL database connectivity
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I

negative implications of IT

  • 1. Mahdi Rahmani 40113290 M2 – Describe the negative implications of IT on Social Communication Report – describe cyber bullying, spam, hacking, virus, phishing, suggest protection mechanism. Impact of IT - M2 How can IT impact individuals, what are negative implication – explain and describe cyber bullying, spam, hacking, virus, phishing – what all this means and what are the implication for users, what are the safety measures one need to take to protect and observe.  • Cyber bullying  • Spam  • Phishing  • Denial of service In M2 task I’mgoingto explainpointbypointof negativeimpactof ITon social communication. Firstly,goingtoexplaincyberbullyingonITand whatis cyberbullying. • Cyber bullying Cyberbullying may vary fromhumiliating or offensiveblog posts or video photos, to cyber-attacks, criticism and derogatory remarks, to hacking via newsletters, blogs, social networking channels and text messages. Growing age demographic is proneto cyberbullying butrising perpetrators are teens and young adults. cyberbullying is a increasing issuein schools that has becomes a concern because the internet is relatively private, which leads to abusers because it is impossibleto track their harassment. Unfortunately, theories, warnings and photographs can quite easily be disseminated online. How we can help this people againstcyber bullying? Firstly, wehave to keep all records of any online activity like Emails, Web pages, social media posts, Including relevantdates and times. Keep both an electronic version and a printed copy of each document,
  • 2. Mahdi Rahmani 40113290 • Spam What is Spam? Spamemail. Such unwanted spam notifications that we consider cluttering our inboxes, are a challenge for internet users, business and politicians alike. Estimates vary but somesuggestthat more than 100 billion spam messages are sent per day, reflecting as much as 85 percent of the total global email traffic. As you in our email list we haveone box called junk email which is means spam or some email come from someone we don’tknow who is it and wherecome from. How could protect yourself from spam? 1. Think before click on any email. 2. Downloading anti-spam. 3. don’treplay to spam massage.
  • 3. Mahdi Rahmani 40113290 • Phishing Phishing is the fraudulent attempt to obtain sensitive information such as username. Password and bank details by disgusting oneself as trustworthy ideally in an electronic communication. It’s so important to know how to protect your details from this people sometime we open some link we don’tknow where come from especially some web they don’thave https These webs are not safe to put your details or shopping via your credit card. Common features of phishing email. 1. Too good to be true Phishing designed to attract people’s attention immediately. Like a lottery when you see it in advertising and best way to stay protect don’tgo for any email or advertising. 2. Hyperlinks By changing some words, they can drag you to click in any link that they want. 3. Attachments When you see an attachment in an email that you didn't anticipate or that makes no sense, don't open it! They also bear payloads such as malware, or other viruses. Look at this example of phishing.
  • 4. Mahdi Rahmani 40113290 Four steps to protect yourself from phishing. 1.protectyour pc by using security software. 2.protectyour phone by setting softwareto update automatically. 3.protectyour account by using multi-factor authentication. Like getting messagewhen you sign your account. 4.protectyour data by backing up. Putting your data into external hard drive.
  • 5. Mahdi Rahmani 40113290 Denial of service Is method of attacking a networked computer by sending it an abnormally high number of requests, causing its network to slow down or fail. Since a single individual cannot generate enough traffic for a dos attack, these attacks are usually run from multiple computers infected by worms or computer for a dos. How does a DOS Attack work? Always Dos attackers they working together to attack the webs or pages to load this website and stop it for while or forever. Even they can attack computers and all that means shut down our machine or web. How we can preventDos attack? 1. Buy more bandwidth. 2. Build redundancy into your infrastructure. 3. Configure your network hardware against Dos attacks. 4. Deploy anti-Dos hardware and software. 5. Deploy a Dos protection appliance. 6. Protect your DNS servers. Finely to protect your computer there are a range of protection steps people and organisation may take to securetheir data and protect computer networks
  • 6. Mahdi Rahmani 40113290 and service, such as encryption , firewalls , anti-virus, anti-spyware, passwords, backups and biometric authentication.