Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Being too visible on the internet is dangerous (0)

1 Hindamata
Punktid
Being too visible on the internet is dangerous #1
Punktid 50 punkti Autor soovib selle materjali allalaadimise eest saada 50 punkti.
Leheküljed ~ 1 leht Lehekülgede arv dokumendis
Aeg2011-12-15 Kuupäev, millal dokument üles laeti
Allalaadimisi 5 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor Mehka Õppematerjali autor
Lühi essee teemal Liiga nähtav olla internetis on ohtlik

Sarnased õppematerjalid

thumbnail
7
doc

Identiteedivargus

The internet if full of stories about stolen credit card details, that have been used to order things online, buy gift cards and pretty much everything else imaginable. The more serious cases talk about criminal identity theft, identity cloning and medical identity theft where people have been framed for crimes they did not commit(from speeding tickets and drug posession to funding terrorism), where people have lost their jobs due to not being able to prove their innocence or even cases where people were not able to get the medicine nessecary due to someone else posing as them and collecting the perscription first. Example: Anndorie Sachs Has a Baby Anndorie Sachs was a mother of four enrolled at the University of Utah when she received a call from a gravely serious Child Protective Services representative informing her that she was under investigation because her newborn baby had tested positive for methamphetamines. Sachs was

Inglise keel
thumbnail
16
docx

Social media information and data collection and security

Privacy and data protecion topics are becoming more and more important and the amouts of data generated is becoming larger. When wrongly access this kind of data, a lot damage could be done by criminals. Users privacy settings should be reviewd and fixed when needed. Social media Humans have always felt the need to socialize. Constantly. From the early ages to the signs and speech, from letters to telegram, from phones to internet, need to communicate has become less of an hussle and more convenient and accessible. In our modern society social media usage is constantly rising. For example since January 2016 to January 2017 active social media users have increased by 21% and internet users have increased by 10%. Our every day life is internet connection, sharing information, expressing ideas, liking and disliking content. It helps us to feel connected to the world and

Inglise keel
thumbnail
215
docx

Steve Krug-Dont Make Me Think 2014

—DOROTHYGALE(JUDYGARLAND)INTHEWIZARDOFOZ(1939) I wrote the first edition ofDon’t Make Me Thinkback in 2000. By 2002, I began to get a few emails a year from readers asking (very politely) if I’d thought about updating it. Not complaining; just trying to be helpful. “A lot of the examples are out of date” was the usual comment. My standard response was to point out that since I wrote it right around the time the Internet bubble burst, many of the sites I used as examples had already disappeared by the time it was published. But I didn’t think that made the examples any less clear. Finally, in 2006 I had a strong personal incentive to update it. 1But as I reread it to see what I should change, I just kept thinking “This is all still true.” I really couldn’t find much of anything that I thought should be changed.

Kategoriseerimata
thumbnail
14
docx

Misusing and Abusing the IoT ( Ingliskeelne referaat andmeturve ITX0040 jaoks)

Misusing and Abusing the IoT - Now and in the Future The Internet of Things is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data [1]. As the amount of devices connected to the internet of things is constantly on the rise, making it innately more secure and protecting those devices from abuse, in a sense of unwanted access , manipulation by third parties and other scenarios, is rapidly turning into a pressing issue. According to some sources there were about 13.4 billion connected devices back in 2015 and the projections show there might be up to 38.5 billion such devices in 2020 [2]. As the number of devices increases, the necessity for a proper security

Andmeturbe alused
thumbnail
9
docx

Big data in cloud

The best storage location we have for it, for now, is the cloud, or in other words, the deep web. A good analogy is of an iceberg, where the part which is above the water level is the part, that the user can see and interact with. And the part below is comprised of the database and algorithms designed to process the data and send it to the appropriate user. Now, as we have those premises clear, we can finally understand and appreciate the opportunities of big data and the feasibility of it being stored within the cloud. Opportunities Academic essay (ITI0103) 2019 spring Due to the recent data revolution, new data formats and databases with unimaginable scales have arisen, and artificial intelligence including machine learning greatly benefiting from it. Artificial intelligence requires tremendous quantities of data for it to be exact, and big data is exactly that. Some game including machine learning examples are:

Algoritmid ja andmestruktuurid
thumbnail
1
rtf

Chat rooms

The first and most important thing you need to realize about the Internet is that you can find anything and anyone on the Internet that you can find in the real world. The only difference is that in the Internet you have a greater deal of anonymity that you get in the real world. Can chat rooms be dangerous? Most definitely. Particularly channels that clearly are catering to younger children. Pedophiles go where the kids are, and that is just as true on the Internet as in the "real world". Does that mean you should avoid all chat channels? Not at all. Just be aware of what you are doing and saying, and if you have small children, be sure to monitor their activity on the Internet. There are several programs, as I recall, that allow parents to track what their children are seeing and doing while on-line. One of the biggest threats on chat rooms is the presence of pedophiles, online

Inglise keel
thumbnail
14
docx

Trojan horse

Utility hidden controls allow you to do with the computer all that they laid the author: to take or send files, start and destroy them, display messages, erase, reboot the computer, etc. Trojan-PSW - stealing passwords When you start looking for PSW-Trojan sictemnye files stored on a range of confidential information (usually phone numbers and passwords to access the Internet) and send it to the specified code in the "Trojan" e-mail address or addresses. Trojan-Clicker - Internet clickers. This family of Trojans, whose main function - the organization of unauthorized access to Internet resources. Trojan-Downloader - Ships other malware Trojan horses of this class are designed to download and install on the victim machine new versions of malicious programs, install Trojans or advertising systems. Trojan-Dropper - installers other malware As a result of using this class of software hackers reach two goals: a secretive installation of

inglise teaduskeel
thumbnail
8
doc

Inglise keele kodulugemine teemal: Mass Media

Public speaking and event organizing can also be considered as a form of mass media. Electronic Media: For many people, it is impossible to imagine a life without their television sets, be it the daily news dose or even the soap operas.This mass media includes television and radio. This category also includes electronic media like movies, CDs and DVDs as well as the new hottest electronic gadgets. New-age Media: With the advent of new technologies like Internet, we are now enjoying the benefits of high technology mass media, which is not only faster than the old-school mass media, but also has a widespread range. Mobile phones, computers and Internet are often referred to as the new-age media. Internet has opened up several new opportunities for mass communication which include email, websites, blogging, Internet tv and many other mass media which are booming today. History and Origin of Mass Media

Inglise keel




Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun