Unit 1 - Threats – M2
Cyber Bullying:
0 The problem is it is increasing because more and more teenagers are
using social media websites such as (Facebook, Twitter, MySpace) This
means more teenagers are being bullied every year due to this.
0 It is a threat because more people are suffering from being bullied every
year. This effects children every year as they don’t want to go out or go
to school because they are afraid.
0 The people who are effected are children, teenagers and sometimes
adults because people are being threatened over the internet.
0 The threat is getting worse as more people are now using the internet
and social media websites.
0 Some solutions to stop this from happening is you could make social
websites have minimum age and add a report button on the websites.
Virus Infection:
0 The problem is your computer can receive a virus by accessing certain e-
mails and going onto unsecure websites.
0 This is a threat because if you have important documents, the virus on
your computer may delete the documents off the hard drive or even
crash the computer.
0 The people who are affected by this are people who have access to a
computer and e-mail.
0 This threat is quite severe because peoples computers get hacked and
people are able to access everything on your computer and even delete
them.
0 You can solve this problem by teaching your children what websites are
safe and what websites are not.
Spam:
0 This is where you get an continuing number of unknown e-mails saying
stuff that is not true, such as: You have won a prize or saying that your
computers virus protector has run out.
0 The problem is increasing because more and more people are believing
it and clicking on the links and then their computer is receiving a virus.
0 The people who are being effected by this are the people who have
access to an e-mail account.
0 The threat is quite bad as more people are believing it and then they are
receiving viruses on their computer.
0 You can solve this problem by telling people about spam and tell them
how to spot spam.
Phishing:
0 Phishing is where people make fake websites in an attempt to scam
people in to getting their important details.
0 The problem is people are getting tricked into thinking that they are on
the correct website but it is a fake then they give the people important
details such as their bank account details.
0 The people who are being effected by this is the people who are going on
to this websites thinking they are real and giving out private
information.
0 The threat is quite bad as people are being effected quite bad by giving
out private information and then in the future getting scammed.
0 You can solve this problem by making people aware of phishing and how
to tell the difference between the real website and the fake website.
Denial Of Service:
0 A denial-of-service attack is an attempt to make a machine or network
resource unavailable to its intended users. Although the means to carry
out, motives for, and targets of a DoS attack may vary, it generally
consists of the efforts of one or more people to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet.
0 This is a threat because if people are trying to use the network or
machine they will not be able to because it will be unavailable.
0 The people that are being effected by this are people who are trying to
use a machine or network resource.
0 The threat is quite bad because people will be unable to use certain
machine or network resources.
0 You can solve this problem by trying to make the machine or network
more secure.

More Related Content

PPTX
Threats – m2
DOCX
negative implications of IT
PDF
Social Media Safety
PPTX
Cyber Bullying Presentation for Schools
PPT
Social Media Safety Presentation
PPTX
Internet saftey
PPTX
Social Media on Education and its Effects
PPTX
Social media Challenges and Advantage
Threats – m2
negative implications of IT
Social Media Safety
Cyber Bullying Presentation for Schools
Social Media Safety Presentation
Internet saftey
Social Media on Education and its Effects
Social media Challenges and Advantage

What's hot (18)

PPTX
Media etiquette 2021
PPT
Social Networking and Internet Safety
PPTX
Cake - An Ethereum Powered Social Network Aggregator
PPT
Social media Risk Management Presentation Sample (Animations don't work in sl...
PPTX
Digital Safety, Data Privacy, and Online Netiquette
PPT
5 a module online privacy
PDF
Social Media Safety Tips
PPTX
IT for Managers
PPTX
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
PPT
SOCIAL Networking Sites
PPT
Internet Safety
PPTX
Social networking for schools
PPTX
How to keep your teens safe on social media
PPTX
Internet safety
PPTX
Twitter terms of service
PPTX
Mark Rogers' Social Network Presentation
PPTX
Presentation on the optimal usage of facebook
PPTX
Social media privacy and safety
Media etiquette 2021
Social Networking and Internet Safety
Cake - An Ethereum Powered Social Network Aggregator
Social media Risk Management Presentation Sample (Animations don't work in sl...
Digital Safety, Data Privacy, and Online Netiquette
5 a module online privacy
Social Media Safety Tips
IT for Managers
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
SOCIAL Networking Sites
Internet Safety
Social networking for schools
How to keep your teens safe on social media
Internet safety
Twitter terms of service
Mark Rogers' Social Network Presentation
Presentation on the optimal usage of facebook
Social media privacy and safety
Ad

Similar to Unit 1 - Threats – M2 (20)

PDF
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
PPTX
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
PPTX
Advantages and disadvantages of social media
PPTX
Advantages and disadvantages of social media
PPTX
Internet safety
PPTX
Lecture in Empowerment Technologies week 2.pptx
PPTX
Advantages & Disadvantages of Social Networking
PPTX
Cyber bullying
PDF
Social media and cyberbullying
PPS
Dangers Of Internet - Parents Beware
PPTX
Putting your life online
PPTX
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
PDF
Cyber Crime Awareness and Prevension.pdf
PPTX
KEY
Emma cyber bullying slide.
KEY
Emma cyber bullying slide.
PPTX
Ao4 powerpoint mrs hussain
PPTX
Ao4 powerpoint mrs hussain
PPTX
media safety .pptx
PPT
EFFECTS OF SOCIAL MEDIA ON YOUTH
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Advantages and disadvantages of social media
Advantages and disadvantages of social media
Internet safety
Lecture in Empowerment Technologies week 2.pptx
Advantages & Disadvantages of Social Networking
Cyber bullying
Social media and cyberbullying
Dangers Of Internet - Parents Beware
Putting your life online
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
Cyber Crime Awareness and Prevension.pdf
Emma cyber bullying slide.
Emma cyber bullying slide.
Ao4 powerpoint mrs hussain
Ao4 powerpoint mrs hussain
media safety .pptx
EFFECTS OF SOCIAL MEDIA ON YOUTH
Ad

More from Ryan-Parish (13)

PPTX
Unit 1 - P6 - impact of ict
PPTX
Unit 1 - P5 - Twitter
PPTX
Unit 1 - P4 – how to tweet
PPTX
Unit 7 - Task 3 – P4,P5,M2
PPTX
D1 - virtual desktop and simulated xp installation
PPTX
Step by steps unit 3
PPTX
M1 – different ways to connect to a network
PPTX
How to install skype
PPTX
M3 - how to download norton
PPTX
How to install a Wireless NIC
PPTX
P3 - data flow
PPTX
P2 computer systems
PPTX
P1 – Unit 3
Unit 1 - P6 - impact of ict
Unit 1 - P5 - Twitter
Unit 1 - P4 – how to tweet
Unit 7 - Task 3 – P4,P5,M2
D1 - virtual desktop and simulated xp installation
Step by steps unit 3
M1 – different ways to connect to a network
How to install skype
M3 - how to download norton
How to install a Wireless NIC
P3 - data flow
P2 computer systems
P1 – Unit 3

Recently uploaded (20)

PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Configure Apache Mutual Authentication
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecture types and enterprise applications.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Chapter 5: Probability Theory and Statistics
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
DOCX
search engine optimization ppt fir known well about this
PDF
CloudStack 4.21: First Look Webinar slides
Final SEM Unit 1 for mit wpu at pune .pptx
Configure Apache Mutual Authentication
Zenith AI: Advanced Artificial Intelligence
Convolutional neural network based encoder-decoder for efficient real-time ob...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Module 1.ppt Iot fundamentals and Architecture
A comparative study of natural language inference in Swahili using monolingua...
Architecture types and enterprise applications.pdf
A review of recent deep learning applications in wood surface defect identifi...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Chapter 5: Probability Theory and Statistics
NewMind AI Weekly Chronicles – August ’25 Week III
Benefits of Physical activity for teenagers.pptx
Getting started with AI Agents and Multi-Agent Systems
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
search engine optimization ppt fir known well about this
CloudStack 4.21: First Look Webinar slides

Unit 1 - Threats – M2

  • 2. Cyber Bullying: 0 The problem is it is increasing because more and more teenagers are using social media websites such as (Facebook, Twitter, MySpace) This means more teenagers are being bullied every year due to this. 0 It is a threat because more people are suffering from being bullied every year. This effects children every year as they don’t want to go out or go to school because they are afraid. 0 The people who are effected are children, teenagers and sometimes adults because people are being threatened over the internet. 0 The threat is getting worse as more people are now using the internet and social media websites. 0 Some solutions to stop this from happening is you could make social websites have minimum age and add a report button on the websites.
  • 3. Virus Infection: 0 The problem is your computer can receive a virus by accessing certain e- mails and going onto unsecure websites. 0 This is a threat because if you have important documents, the virus on your computer may delete the documents off the hard drive or even crash the computer. 0 The people who are affected by this are people who have access to a computer and e-mail. 0 This threat is quite severe because peoples computers get hacked and people are able to access everything on your computer and even delete them. 0 You can solve this problem by teaching your children what websites are safe and what websites are not.
  • 4. Spam: 0 This is where you get an continuing number of unknown e-mails saying stuff that is not true, such as: You have won a prize or saying that your computers virus protector has run out. 0 The problem is increasing because more and more people are believing it and clicking on the links and then their computer is receiving a virus. 0 The people who are being effected by this are the people who have access to an e-mail account. 0 The threat is quite bad as more people are believing it and then they are receiving viruses on their computer. 0 You can solve this problem by telling people about spam and tell them how to spot spam.
  • 5. Phishing: 0 Phishing is where people make fake websites in an attempt to scam people in to getting their important details. 0 The problem is people are getting tricked into thinking that they are on the correct website but it is a fake then they give the people important details such as their bank account details. 0 The people who are being effected by this is the people who are going on to this websites thinking they are real and giving out private information. 0 The threat is quite bad as people are being effected quite bad by giving out private information and then in the future getting scammed. 0 You can solve this problem by making people aware of phishing and how to tell the difference between the real website and the fake website.
  • 6. Denial Of Service: 0 A denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. 0 This is a threat because if people are trying to use the network or machine they will not be able to because it will be unavailable. 0 The people that are being effected by this are people who are trying to use a machine or network resource. 0 The threat is quite bad because people will be unable to use certain machine or network resources. 0 You can solve this problem by trying to make the machine or network more secure.