类别 全部 - phishing - business - identity - addiction

作者:Shakirs Franco 4 年以前

132

INTERNET RISK2

Staying safe online involves several precautionary measures to protect personal and sensitive information from various threats. Using strong passwords, encrypted connections, and advanced authentication methods can help safeguard one'

INTERNET RISK2

Internet Risk

You can now Download your mind map and use it to communicate with your stakeholders.

It can then become the basis for detailed planning and scheduling.

INTERNET RISK

Enter your project name


Begin by typing your project name into the Central Topic.

To protec your identity you can

Beware of asked for your personal information
Use encrypted connections to the internet
Learn how to "Phys" websites and emails
Uses strong authentication technology
Use the strong password

Be carefull of

Social networkings sites are targets for scams
Instagram
Twitter

Add other communication events that will support your project

Facebook

Include a project review?

The project review meeting takes place once the project has been closed, and examines the processes that led to both success and failure in the project.

Add a description of the meeting goals in the Notes panel

Phishing
It is the crime of tricking people into sharing confidential information such as passwords and credit card numbers
Indentity thieves
Signs that you might be a victim of identity thieves

Missing mail

Undamiliar mail

Medical insurance statement

Collection agency calls

Credit card gets declined

Errors on your credit report

They can use the information they find online to drain your bank account

Add a communication/collaboration tool.

Examples include:

For addicted people

Internet addiction disorder
Refers to excessive computer use which interfers with daily life

Add a requirements management technique

Techniques might include:

For Childrens

Divulging personal information
Illegal Behaviour
Bullying
Physical Danger
Innapropriate Material

For bussiness

All organizations that conduct some portion of their business on the internet experience the online risk
Their online risk can be in

Type in a project deliverable

For example:

Processes by which the organization operates

Information about projects

Personal data