Web 2.0 and Online Security Threats

undefined
 
WEB 2.0
READ/WRITE WEB
 
Eidson
 
WORLD WIDE WEB
 
S
i
r
 
T
i
m
 
B
e
r
n
e
r
s
-
L
e
e
 
W
o
r
l
d
 
W
i
d
e
 
W
e
b
 
I
n
v
e
n
t
o
r
-
1
9
8
9
 
W
e
b
 
2
.
0
 
 
T
h
e
 
R
e
a
d
/
W
r
i
t
e
 
W
e
b
 
BLOGS
 
Coined phrase in 1997
Short for Weblogs
Bloggers are people who blog
Google has a free one – Blogger
http://wordpress.org/showcase/
 
BLOGGER
 
Leading blogging site is Blogger
6.7 million people blog
Majority of bloggers are women
Business uses them to get customers
 14% earn a living by blogging
http://www.socialmediatoday.com/content/blogconomy-blogging-stats-infographic
 
BLOG CHARACTERISTICS
 
Easily created
Easily updated by author
W
e
b
 
s
i
t
e
 
t
h
a
t
 
c
o
n
t
a
i
n
s
 
d
a
t
e
d
 
t
e
x
t
 
e
n
t
r
i
e
s
 
i
n
r
e
v
e
r
s
e
 
c
h
r
o
n
o
l
o
g
i
c
a
l
 
o
r
d
e
r
 
(
n
e
w
e
s
t
 
e
n
t
r
y
f
i
r
s
t
)
 
a
b
o
u
t
 
a
 
p
a
r
t
i
c
u
l
a
r
 
t
o
p
i
c
 
WIKIS
 
A collaborative Webspace where anyone can add
content and anyone can edit it.
Wikipedia (online encyclopedia)
Wikispaces (free resource)
http://www.wikispaces.com/site/tour#introduction
 
SOCIAL MEDIA SITES
 
Online communities of
people who share
interests and/or
activities or want to
share information
Younger people use
social networking sites
more
 
MALWARE
 
Definition
A term that describes a group of
mal
icious soft
ware 
programs
intended to annoy you or destroy
your data
Examples: worms, viruses, Trojan
horses, spyware
 
TROJAN HORSE
 
A destructive program that
pretends to be a safe application,
but tries to steal your information.
It does not replicate (reproduce
itself).
 
VIRUS
 
A program that is loaded on
your computer, without your
knowledge, and tries to
damage your computer.
Typically uses all your
memory by replicating itself.
 
WORM
 
A program that replicates itself
over a computer network and
performs malicious actions.
A type of virus.
Cannot reproduce itself.
 
SPYWARE
 
Software that secretly
gathers user information
through your Internet
connection without your
knowledge.
Is usually downloaded as part
of freeware or shareware.
 
SUMMARY
 
Web 2.0 has many great tools:
Blogs
Wikis
Social Networking Sites
Malware
Trojan Horse
Virus
Worm
Spyware
undefined
 
REFERENCES
 
Carvin, A. (2005, February 1). Tim Berners-Lee: Weaving a semantic web.
Retrieved March 2, 2009, from
http://www.digitaldivide.net/articles/view.php?ArticleID=20.
Slide Note
Embed
Share

Explore the evolution of Web 2.0, the concept of Read/Write web, the significance of blogs and wikis, and the impact of social media sites. Learn about the risks posed by malware, trojan horses, viruses, and worms in the online landscape.

  • Web 2.0
  • Online Security
  • Blogs
  • Wikis
  • Social Media

Uploaded on Sep 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. WEB 2.0 READ/WRITE WEB Eidson

  2. WORLD WIDE WEB Sir Tim Berners-Lee World Wide Web Inventor-1989 Web 2.0 The Read/Write Web

  3. BLOGS Coined phrase in 1997 Short for Weblogs Bloggers are people who blog Google has a free one Blogger http://wordpress.org/showcase/

  4. BLOGGER Leading blogging site is Blogger 6.7 million people blog Majority of bloggers are women Business uses them to get customers 14% earn a living by blogging http://www.socialmediatoday.com/content/blogconomy-blogging-stats-infographic

  5. BLOG CHARACTERISTICS Easily created Easily updated by author Web site that contains dated text entries in reverse chronological order (newest entry first) about a particular topic

  6. WIKIS A collaborative Webspace where anyone can add content and anyone can edit it. Wikipedia (online encyclopedia) Wikispaces (free resource) http://www.wikispaces.com/site/tour#introduction

  7. SOCIAL MEDIA SITES Online communities of people who share interests and/or activities or want to share information Younger people use social networking sites more

  8. MALWARE Definition A term that describes a group of malicious software programs intended to annoy you or destroy your data Examples: worms, viruses, Trojan horses, spyware

  9. TROJAN HORSE A destructive program that pretends to be a safe application, but tries to steal your information. It does not replicate (reproduce itself).

  10. VIRUS A program that is loaded on your computer, without your knowledge, and tries to damage your computer. Typically uses all your memory by replicating itself.

  11. WORM A program that replicates itself over a computer network and performs malicious actions. A type of virus. Cannot reproduce itself.

  12. SPYWARE Software that secretly gathers user information through your Internet connection without your knowledge. Is usually downloaded as part of freeware or shareware.

  13. SUMMARY Web 2.0 has many great tools: Blogs Wikis Social Networking Sites Malware Trojan Horse Virus Worm Spyware

  14. REFERENCES Carvin, A. (2005, February 1). Tim Berners-Lee: Weaving a semantic web. Retrieved March 2, 2009, from http://www.digitaldivide.net/articles/view.php?ArticleID=20.

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#