M A D E B Y : J E E T
K O T H A D I Y A
INTRODUCTION
• Uses of ICT had affected our day to day lives
in many ways.
• For example: online shopping and e-banking
IS YOUR COMPUTER SAFE?
• Hacking is a act of gaining access to a
computer system or network without legal
authorization.
• ICT has cause lot many of crimes in our
society. Due to which innocent people get in
trouble.
• Also hackers change, copy, leak, delete the
information which is kept in secret.
EFFECTS OF ICT ON SOCIETY.
IMPACT ON EMPLOYEES.
Advantages:-
• People get jobs easily online.
• Some people do their jobs
online at home and get paid.
Disadvantages:-
• Robots are over taking.
• Decrease in employment.
IMPACT ON ONLINE SHOPPING.
 Advantages
• Can get number of verities.
• Useful for old-age people because they do walk for a long distance.
• Less time consumed
 Disadvantages
• Can be a fake website.
• Product might be fake
IMPACT ON E-BANKING
 Advantages
• Easy to use rather than waiting in the office.
• Good for old people. Due to health problems.
• Transactions are very fast and time saving.
 Disadvantages
• Can be hacked.
• Transfers may happen to wrong accounts.
• He/she should need to be trained.
SECURITY ISSUES.
There are many types of security issue.
1. Phishing
2. Pharming
3. Spam
4. Spyware
PHISHING
 Phishing is similar to fishing in a lake, but instead of
trying to capture fish, phishers attempt to steal your
personal information. They send out e-mails that
appear to come from legitimate websites such as
eBay, PayPal, or other banking institutions. The e-
mails state that your information needs to be updated
or validated and ask that you enter your username
and password, after clicking a link included in the e-
mail.
PHARMING
Pharming is yet another way
hackers attempt to manipulate
users on the Internet.
While phishing attempts to
capture personal information by
getting users to visit a fake
website, pharming redirects
users to false websites without
them even knowing it.
SPAM
 Spam is most often considered to be electronic junk
mail or junk newsgroup postings. Some people define
spam even more generally as any unsolicited email.
However, if a long-lost brother finds your email
address and sends you a message, this could hardly
be called spam, even though it is unsolicited. Real
spam is generally email advertising for some product
sent to a mailing listor newsgroup.
SPYWARE
 Spyware is any technology that aids in gathering
information about a person or organization without
their knowledge. On the Internet (where it is
sometimes called a spybot or tracking software),
spyware is programming that is put in someone's
computer to secretly gather information about the
user and relay it to advertisers or other interested
parties. Spyware can get in a computer as a
software virus or as the result of installing a new
program.
SHOULD THE INTERNET BE POLICED?
THANK YOU

More Related Content

PPTX
Advantages and Disadvantages of Internet
PPTX
The disadvantages of ict
PPTX
Disadvantages of-i ct-woww
PDF
CDSE Cybsecurity Awareness Posters
PPT
Misuse of Internet
PPT
Cyber Crime
PDF
PPTX
The internet
Advantages and Disadvantages of Internet
The disadvantages of ict
Disadvantages of-i ct-woww
CDSE Cybsecurity Awareness Posters
Misuse of Internet
Cyber Crime
The internet

What's hot (19)

PPT
Employee Misuse of Internet and Blogosphere
PPTX
Misuse of Internet
PPTX
Internet safety
PPTX
Cyber crime
PPTX
Misuse of social media
PPSX
What Are My Risks
PPSX
Email strategies
PPTX
advantages and disadvantages of using internet
PPTX
Digital literacy 2
PPTX
ECDL Module 7: Web Browsing and Communication
PDF
Cybersecurity Awareness Infographics
PPT
Internet
PDF
PPT
Computer crime
PDF
Internet Crimes : Why it is scary & How to avoid it
PPTX
Does Twitter have a positive impact in the United States?
PPT
Security Presentation
PPT
Employee Misuse of Internet and Blogosphere
Misuse of Internet
Internet safety
Cyber crime
Misuse of social media
What Are My Risks
Email strategies
advantages and disadvantages of using internet
Digital literacy 2
ECDL Module 7: Web Browsing and Communication
Cybersecurity Awareness Infographics
Internet
Computer crime
Internet Crimes : Why it is scary & How to avoid it
Does Twitter have a positive impact in the United States?
Security Presentation
Ad

Viewers also liked (20)

PPT
Usage of ict in daily life
PPTX
The uses of ict in our society
PPT
Usage Of Ict In Every Day Life
PPTX
Uses of ict in society
PPT
Usage of ICT in daily life
PPTX
Ch 4 ict in-day2_day_life
PPTX
Ict in medicine
PPTX
Illustrator exercises
PPT
Illustrator assignment 1
PPT
Illustrator Exercises
KEY
Ontology Alignment using Linked Data
PPTX
Lesson 3- Usage of ICT in daily life
PDF
ICT Applications for Healthcare
PPSX
The use of ict for learning and teaching (week 1)
PDF
Learning Illustrator CS6 with 100 practical exercises
PPTX
Introduction to subject cataloguing
DOCX
Ict in medicine
PDF
Semantic data mining: an ontology based approach
PPT
Data Discovery, Visualization, and Apache Hadoop
PDF
Health Informatics & eHealth: Application of ICT for Health
Usage of ict in daily life
The uses of ict in our society
Usage Of Ict In Every Day Life
Uses of ict in society
Usage of ICT in daily life
Ch 4 ict in-day2_day_life
Ict in medicine
Illustrator exercises
Illustrator assignment 1
Illustrator Exercises
Ontology Alignment using Linked Data
Lesson 3- Usage of ICT in daily life
ICT Applications for Healthcare
The use of ict for learning and teaching (week 1)
Learning Illustrator CS6 with 100 practical exercises
Introduction to subject cataloguing
Ict in medicine
Semantic data mining: an ontology based approach
Data Discovery, Visualization, and Apache Hadoop
Health Informatics & eHealth: Application of ICT for Health
Ad

Similar to Uses of ict in our environment (20)

PPTX
Online spying tools
PPTX
Online spying tools
DOCX
THESIS-2(2)
PPTX
Parag presentation on ethical hacking
PPTX
Computer Security and Safety, Ethics, and.pptx
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
Cyber Safety Class 9
PPTX
Internet cybercrime,ebanking and security
PPTX
Ethical Dilemmas/Issues in CyberWorld
PPTX
Privacy , Security and Ethics Presentation
PDF
Empowerment Technologies - Module 2
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PPT
Chapter 6 effects of ict on society
PPTX
Internet security powerpoint
PPTX
cyber security.pptx
PPTX
Chapter 1
PPTX
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
PPTX
Computer security privacy and ethics
PPTX
Chapter 1
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
Online spying tools
Online spying tools
THESIS-2(2)
Parag presentation on ethical hacking
Computer Security and Safety, Ethics, and.pptx
Online-Safety-Security-and-etiquette.pptx
Cyber Safety Class 9
Internet cybercrime,ebanking and security
Ethical Dilemmas/Issues in CyberWorld
Privacy , Security and Ethics Presentation
Empowerment Technologies - Module 2
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Chapter 6 effects of ict on society
Internet security powerpoint
cyber security.pptx
Chapter 1
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
Computer security privacy and ethics
Chapter 1
c13 Security and Ethics(1)(1)(1).pptsasdax

Uses of ict in our environment

  • 1. M A D E B Y : J E E T K O T H A D I Y A
  • 2. INTRODUCTION • Uses of ICT had affected our day to day lives in many ways. • For example: online shopping and e-banking
  • 3. IS YOUR COMPUTER SAFE? • Hacking is a act of gaining access to a computer system or network without legal authorization. • ICT has cause lot many of crimes in our society. Due to which innocent people get in trouble. • Also hackers change, copy, leak, delete the information which is kept in secret.
  • 4. EFFECTS OF ICT ON SOCIETY.
  • 5. IMPACT ON EMPLOYEES. Advantages:- • People get jobs easily online. • Some people do their jobs online at home and get paid. Disadvantages:- • Robots are over taking. • Decrease in employment.
  • 6. IMPACT ON ONLINE SHOPPING.  Advantages • Can get number of verities. • Useful for old-age people because they do walk for a long distance. • Less time consumed  Disadvantages • Can be a fake website. • Product might be fake
  • 7. IMPACT ON E-BANKING  Advantages • Easy to use rather than waiting in the office. • Good for old people. Due to health problems. • Transactions are very fast and time saving.  Disadvantages • Can be hacked. • Transfers may happen to wrong accounts. • He/she should need to be trained.
  • 8. SECURITY ISSUES. There are many types of security issue. 1. Phishing 2. Pharming 3. Spam 4. Spyware
  • 9. PHISHING  Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e- mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e- mail.
  • 10. PHARMING Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.
  • 11. SPAM  Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing listor newsgroup.
  • 12. SPYWARE  Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
  • 13. SHOULD THE INTERNET BE POLICED?