Only a fraction of parents actively monitor their children’s activity when they are on the internet....[tags: supervision, internet, safety] - Modern forms of social networking can be a challenge and an advantage for people of any age, this can be particularly so for teenagers.
[tags: cybercrimes, phishing, scam] - Internet Safety can be defined as the awareness of one's vulnerability on while using the internet an expanding personal security to avoid being targeted by online crime ( Wikipedia and Web Definitions).
There is two types of damage that can be inflicted on unaware internet users, the first is personal damage and the second is computer damage.
Internet crime involving personal damage includes cyberbullying, phishing, cyber stalking, identity theft, spam, online predation and obscene content.
There is also various softwares that have been created by malevolent internet users to inflict damage to one’s computer, some of these softwares include malware, spyware, trojan horses and computer virus...
1.3 Difference between cryptography and steganography Cryptography and steganography are technologies used for different purposes but have same objective i.e.
to send the secret data in such a way that it is not readable by someone who is not the intend recipient.[tags: internet safety] - Research Critique The ability of the attackers to rapidly gain control of vast number of Internet hosts poses an immense threat to the overall security of the Internet (Staniford, Paxson & Weaver, 2002).Once compromised, these hosts can not only be used for massive Distributed Denial of Service (DDo S) attacks, but also steal or corrupt great quantities of sensitive information by confusing and disrupting the network in more subtle ways (Honeynet, 2005).- Viruses A person is very easy to take advantage of, because you’re on the internet and people can hack your computer if you’re not careful and take correct actions.For example, a girl was talking to a guy she was introduced to online by another friend.The United States Department of Defense started to use a network similar to today's Internet in the 1960s.