Professional Documents
Culture Documents
Presentation ON Internet and Its Various Issues
Presentation ON Internet and Its Various Issues
ON
INTERNET AND ITS VARIOUS
ISSUES
By:- Group no. 4
Priyanka Sindwani Nitesh Yadav
Shailender anguria Shilpi Arora
Sumit kumar Neeraj swami
Karan Bagga Anubha
Heena Dasaur Megha khatri
INTRODUCTION
• As Internet is in constant transformation, social values
rebound and impact on further development. The internet
is a form of organized anarchy; it’s in flux all the time, and
it’s decentralized because no company, organization, or
government runs it.
₰ 1984 : The domain name system era - “.com”, .edu and .gov.
• Browsing
• Communication
• E-Marketing
• Entertainment
• Services
Tremendous Changes in the economy
with the advent of Internet
E-Commerce
Net Banking
Outsourcing
Online Education
THREATS & ISSUES IN INTERNET
• Gambling
Despite being illegal, online
gambling sites are flooding the Internet.
It is unsuitable for children and youth
to view or partake of any activity of these
gambling sites.
• Software theft
Another possibility that can get a company
into real trouble is theft of their software.
• Spoofing
Spoofing is a very common type of attack.
By pretending to be someone else, a
hacker is able to enter a computer system.
• Trojan horses
The Trojan horse works in
the background and collects
information about the system
and its users. These pieces of
information are then sent to the
hacker, who then uses the information to enter the system
or remote control it.
• Office waste
This type of attack requires the attacker to be
near the defendant, which also makes it easier
to find the hacker after the attack.
Contd…
•Misappropriation
Payments from legitimate users may be directed to an
unauthorized party. Although this may be difficult when
credit cards are used, other payment systems may be
more susceptible.
• Spamming
Spamming refers to sending unwanted e-mails in
bulk, which provide no purpose and needlessly
obstruct the entire system.
• Virus threat
Virus is nothing but a program which
disrupts the normal functioning of your
computer systems.
Four types of Security Management