uses of ict in our environment

Post on 11-Jun-2015

211 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

USES OF

ICT

IN O

UR

ENVIRONMENT.

M A D E B Y : J E E T K O T H A D I Y A

INTRODUCTION

• Uses of ICT had affected our day to day lives in many ways.

• For example: online shopping and e-banking

IS YOUR COMPUTER SAFE?

• Hacking is a act of gaining access to a computer system or network without legal authorization.

• ICT has cause lot many of crimes in our society. Due to which innocent people get in trouble.

• Also hackers change, copy, leak, delete the information which is kept in secret.

EFFECTS OF ICT ON SOCIETY.

IMPACT ON EMPLOYEES.

Advantages:-• People get jobs easily

online.• Some people do their

jobs online at home and get paid.

Disadvantages:-• Robots are over taking.• Decrease in

employment.

IMPACT ON ONLINE SHOPPING.

Advantages

• Can get number of verities.

• Useful for old-age people because they do walk for a long distance.

• Less time consumed Disadvantages

• Can be a fake website.

• Product might be fake

IMPACT ON E-BANKING

Advantages

• Easy to use rather than waiting in the office.

• Good for old people. Due to health problems.

• Transactions are very fast and time saving.

Disadvantages

• Can be hacked.

• Transfers may happen to wrong accounts.

• He/she should need to be trained.

SECURITY ISSUES.

There are many types of security issue.

1. Phishing

2. Pharming

3. Spam

4. Spyware

PHISHING

Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. 

PHARMING

Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.

SPAM

Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing listor newsgroup.

SPYWARE

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.

SHOULD THE INTERNET BE POLICED?

THANK YOU

top related