ways to overcome internet threats! identifying internet threats and mitigation
TRANSCRIPT
![Page 1: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/1.jpg)
WAY
S TO O
VERCOME
INTE
RNET TH
REATS!
I DE
NT
I FY
I NG
IN
TE
RN
ET
TH
RE
AT
S A
ND
MI T
I GA
TI O
N
![Page 2: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/2.jpg)
DESCRIPTION
The Internet offer many great resources for information, social networking or having fun. Unfortunately, if you are not taking precaution, your personal information such as phone number, email address, passwords, and etc. could be stolen, you are could be the victim of Internet fraud or in the worst case scenario you could become a target of an Internet predator.
![Page 3: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/3.jpg)
Cyber-bullying
THREAT that embarrasses, mistreats or frightens its victim
TYPE OF THREAT
![Page 4: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/4.jpg)
Cyber-stalking
STALKING people by using Internet and Technology
TYPE OF THREAT
![Page 5: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/5.jpg)
Identity theft
Someone ILLEGALLY uses your personal information to form an Internet fraud
TYPE OF THREAT
![Page 6: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/6.jpg)
TYPE OF THREAT
Internet Predator
a.k.a SEXUAL predator on the Internet
![Page 7: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/7.jpg)
TO PROTECT
YOURSELVES
FROM BEING A VICTIM:-
![Page 8: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/8.jpg)
MITIGATION
REPORT TO AUTHORIZED PERSONAL TO TAKE ACTION
![Page 9: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/9.jpg)
ONLY PROVIDE NECESSARY PERSONAL DATA WHEN NEEDED.
MITIGATION
Eg. Sign up for social networking profile.
![Page 10: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/10.jpg)
MITIGATION
CHECK FOR SECURITY OF THE WEB URL:
“https” is the website that provides secure connection to user
![Page 11: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/11.jpg)
DO NOT OPEN OR APPROVED ANY POP-UP MESSAGE, SPAM EMAIL AND ETC.
MITIGATION
![Page 12: WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION](https://reader036.vdocuments.mx/reader036/viewer/2022062314/56649ecf5503460f94bdcdd9/html5/thumbnails/12.jpg)
THE ENDFree background music “Relaxing Music ( Instrumental Piano )” download from:-http://www.youtube.com/watch?v=94HYEe1bOFU&ob=
Pictures downloaded from:-http://www.123rf.com/photo_3661607_a-cute-little-girl-daydreaming-during-computer-playing.htmlhttp://www.womenspress-slo.org/?p=3877http://stjamescybersafety.pbworks.com/w/page/38651722/Cyber%20Stalkinghttp://www.shemagazines.com/10-tips-to-help-keep-your-children-safe-from-internet-dangers/http://www.life123.com/career-money/credit-debt/identity-theft/common-identity-theft-scams.shtmlhttp://www1.1citizen.com.my/Logo/Logo_1Citizen.png
Prepared By:-Mohamad Faqrull Izrall Bin Mat FiahMohamd Izazuddin Bin Hassan