2. OBJETIVES
At the end of this lesson, the students should be able to:
1. Consider one’s and others’ safety when sharing information using
the internet;
2. Consider one’s and others’ reputation when using the internet;
3. Determine and AVOID the dangers of the internet;
4. Be responsible in the use of social networking sites; &
5. Browse the internet efficiently & properly through proper
referencing.
4. Internet
Internet is defined as
information superhighway.
Anyone who has access to this
highway, can place information
and can grab that information.
6. Malware
malicious software
It can take the form of executable code, scripts,
active content, and other software.
computer viruses
worms
Trojan horses
spyware
adware, and
Spam
Phishing
other malicious
programs.
7. Computer Virus
A computer virus is a malware that; when executed,
replicates by reproducing itself or infecting other
programs by modifying them.
The term computer virus was a misnomer until it was
coined by Fred Cohen in 1985.
8. Worm
A computer worm is a
standalone malware computer
program that replicates itself in order to
spread to other computers.
9. Trojan
a malicious program that is
disguised as useful program but
once installed, leave your PC
unprotected and allows hackers to
get your information.
11. Spyware
a program that runs in the background
without you knowing it. It has ability to
monitor what are you currently doing and
typing through keylogging.
keyloggers – used to record the
keystroke done by the users
28. 14. Buy the software; do not use
pirated ones.
29. 15. Do not reply or click links from
suspicious emails.
Editor's Notes
Netiquette" is network etiquette, the do's and don'ts of online communication.
Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace.
how this things happen?
is an umbrella term used to refer to a variety of forms of hostile or intrusive software
Most often this is spread by sharing software or files between computers. It can be spread by downloading files, exchanging CD/DVDs and USB sticks, copying files from servers, or by opening infected email attachments.
The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war.
The most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
The least dangerous and most lucrative Malware. Adware displays ads on your computer.
Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system
Rootkit: This one is likened to the burglar hiding in the attic, waiting to take from you while you are not home. It is the hardest of all Malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other information gathering Malware in to get the identity information from your computer without you realizing anything is going on.
Backdoors: Backdoors are much the same as Trojans or worms, except that they open a “backdoor” onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent.
Rogue security software: This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010
Ransomware: If you see this screen that warns you that you have been locked out of your computer until you pay for your cybercrimes. Your system is severely infected with a form of Malware called Ransomware. It is not a real notification from the FBI, but, rather an infection of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not free of it locking you out again. The request for money, usually in the hundreds of dollars is completely fake.
to learn how website handles the information you shared
By keeping your profile private the search engines will not able to scan your profile.
And browsing in incognito (private mode) cannot protect you from a hacker
The love bugs is the most destructive virus on the history, created by a computer science student of AMA, he’s thesis was rejected by the professor saying