SlideShare a Scribd company logo
1 of 20
INTERNET THREATS
MALWARE SPAM PHISHING
MALWARE
16/11/2022
INTERNET THREATS
1. Malware
– stands for Malicious Software.
16/11/2022
MALWARE
Worm
Trojan
Virus
Adwar
e
Spyware
INTERNET THREATS
16/11/2022
MALWARE
VIRU
S
INTERNET THREATS
a malicious
program designed
to replicate itself
and transfer from
one computer to
another.
16/11/2022
MALWARE
VIRU
S
INTERNET THREATS
16/11/2022
MALWARE
WOR
M
INTERNET THREATS
a malicious
program that
transfers from one
computer to
another by any
type of means.
16/11/2022
MALWARE
WOR
M
INTERNET THREATS
I LOVE YOU WORM
I LOVE YOU WORM
16/11/2022
MALWARE
TROJ
AN
INTERNET THREATS
a malicious program
that is disguised as a
useful program but
once downloaded or
installed, leaves your
PC unprotected and
allows hacker to get
you information
16/11/2022
MALWARE
TROJ
AN
INTERNET THREATS
ROGUE SECURITY
SOFTWARE
a form of malicious
software and Internet fraud
that misleads users into
believing there is a virus on
their computer, and
manipulates them into paying
money for a fake malware
removal
16/11/2022
ROGUE SECURITY SOFTWARE
16/11/2022
MALWARE
ADWAR
E
INTERNET THREATS
a program designed
to send you
advertisements,
mostly as pop-ups.
CERTIFIED
ADWARE!!!
16/11/2022
MALWARE
ADWAR
E
INTERNET THREATS
a program designed
to send you
advertisements,
mostly as pop-ups.
16/11/2022
MALWARE
SPYWA
RE
INTERNET THREATS
a program that
runs in the
background
without you
knowing it.
16/11/2022
MALWARE
SPYWA
RE
INTERNET THREATS
a program that
runs in the
background
without you
knowing it.
16/11/2022
INTERNET THREATS
SPAM
unwanted email mostly
from bots or advertisers.
16/11/2022
INTERNET THREATS
SPAM
An Internet bot, also known as web robot,
WWW robot or simply bot, is a software
application that runs automated tasks
(scripts) over the Internet.
16/11/2022
INTERNET THREATS
PHISHIN
G
-the attempt to obtain sensitive information
such as usernames, passwords, and credit
card details, often for malicious reasons, by
disguising as a trustworthy entity in an
electronic communication.
16/11/2022
INTERNET THREATS
PHISHIN
G
16/11/2022
INTERNET THREATS
PHISHIN
G
CERTIFIED
PHISHING!!!
16/11/2022
16/11/2022

More Related Content

What's hot

Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projectsAubrey Mae Antonio
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Mediajohntk01
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Arniel Ping
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)Sonnie Bars
 
Multimedia and ICT
Multimedia and ICTMultimedia and ICT
Multimedia and ICTMikaela Papa
 

What's hot (20)

Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Power four collaborative1
Power four collaborative1Power four collaborative1
Power four collaborative1
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Media
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)W2 q3-function-of-operating-system (2)
W2 q3-function-of-operating-system (2)
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
Multimedia and ICT
Multimedia and ICTMultimedia and ICT
Multimedia and ICT
 

Similar to THREATS.pptx

Malware infection awareness
Malware infection awareness Malware infection awareness
Malware infection awareness Puseletso Setebe
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWareUmer Saeed
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
CMP PROJECT PRESENTATION .pptx
CMP PROJECT PRESENTATION .pptxCMP PROJECT PRESENTATION .pptx
CMP PROJECT PRESENTATION .pptxPuseletso Setebe
 
Cyber Security Threats of Today - HenkTek.pdf
Cyber Security Threats of Today - HenkTek.pdfCyber Security Threats of Today - HenkTek.pdf
Cyber Security Threats of Today - HenkTek.pdfhenktek
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxSiddeshGowda8
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 

Similar to THREATS.pptx (20)

Internet threats
Internet threatsInternet threats
Internet threats
 
Malware infection awareness
Malware infection awareness Malware infection awareness
Malware infection awareness
 
MALWARE
MALWAREMALWARE
MALWARE
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
CMP PROJECT PRESENTATION .pptx
CMP PROJECT PRESENTATION .pptxCMP PROJECT PRESENTATION .pptx
CMP PROJECT PRESENTATION .pptx
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Cyber Security Threats of Today - HenkTek.pdf
Cyber Security Threats of Today - HenkTek.pdfCyber Security Threats of Today - HenkTek.pdf
Cyber Security Threats of Today - HenkTek.pdf
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 

More from CherryLim21

LESSON 3.ANG PAGBABAGO SA SILANGAN AT TIMOG- SILANGANG ASYA.pptx
LESSON 3.ANG PAGBABAGO SA  SILANGAN AT TIMOG-  SILANGANG ASYA.pptxLESSON 3.ANG PAGBABAGO SA  SILANGAN AT TIMOG-  SILANGANG ASYA.pptx
LESSON 3.ANG PAGBABAGO SA SILANGAN AT TIMOG- SILANGANG ASYA.pptxCherryLim21
 
LESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptx
LESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptxLESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptx
LESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptxCherryLim21
 
introductiontoict-170103050804.pptx
introductiontoict-170103050804.pptxintroductiontoict-170103050804.pptx
introductiontoict-170103050804.pptxCherryLim21
 
Aralin panlipunan 8 1st Q.pptx
Aralin panlipunan 8 1st Q.pptxAralin panlipunan 8 1st Q.pptx
Aralin panlipunan 8 1st Q.pptxCherryLim21
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxCherryLim21
 
Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptxCherryLim21
 
konsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptx
konsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptxkonsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptx
konsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptxCherryLim21
 
Lesson 4.1 PRESENTATION SOFTWARE.pptx
Lesson 4.1 PRESENTATION SOFTWARE.pptxLesson 4.1 PRESENTATION SOFTWARE.pptx
Lesson 4.1 PRESENTATION SOFTWARE.pptxCherryLim21
 
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptx
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptxCURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptx
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptxCherryLim21
 
Lesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptxLesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptxCherryLim21
 
Reading Critic.pptx
Reading Critic.pptxReading Critic.pptx
Reading Critic.pptxCherryLim21
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxCherryLim21
 
MIL Intro- 1.pptx
MIL Intro- 1.pptxMIL Intro- 1.pptx
MIL Intro- 1.pptxCherryLim21
 
LESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.ppt
LESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.pptLESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.ppt
LESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.pptCherryLim21
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxCherryLim21
 
billofrights-new2014-140125193548-phpapp02.pptx
billofrights-new2014-140125193548-phpapp02.pptxbillofrights-new2014-140125193548-phpapp02.pptx
billofrights-new2014-140125193548-phpapp02.pptxCherryLim21
 
Lesson 1 - Politics.pptx
Lesson 1 - Politics.pptxLesson 1 - Politics.pptx
Lesson 1 - Politics.pptxCherryLim21
 

More from CherryLim21 (20)

LESSON 3.ANG PAGBABAGO SA SILANGAN AT TIMOG- SILANGANG ASYA.pptx
LESSON 3.ANG PAGBABAGO SA  SILANGAN AT TIMOG-  SILANGANG ASYA.pptxLESSON 3.ANG PAGBABAGO SA  SILANGAN AT TIMOG-  SILANGANG ASYA.pptx
LESSON 3.ANG PAGBABAGO SA SILANGAN AT TIMOG- SILANGANG ASYA.pptx
 
EAAP
EAAPEAAP
EAAP
 
LESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptx
LESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptxLESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptx
LESSON 2- EXPLAIN THE PROCESS ON HOW TO SPOT A TREND.pptx
 
introductiontoict-170103050804.pptx
introductiontoict-170103050804.pptxintroductiontoict-170103050804.pptx
introductiontoict-170103050804.pptx
 
Aralin panlipunan 8 1st Q.pptx
Aralin panlipunan 8 1st Q.pptxAralin panlipunan 8 1st Q.pptx
Aralin panlipunan 8 1st Q.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptx
 
vb.pptx
vb.pptxvb.pptx
vb.pptx
 
konsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptx
konsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptxkonsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptx
konsepto-ng-asya-aralin-1-grade-7-220902125705-c05da4f0 (1).pptx
 
Lesson 4.1 PRESENTATION SOFTWARE.pptx
Lesson 4.1 PRESENTATION SOFTWARE.pptxLesson 4.1 PRESENTATION SOFTWARE.pptx
Lesson 4.1 PRESENTATION SOFTWARE.pptx
 
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptx
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptxCURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptx
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION.pptx
 
Lesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptxLesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptx
 
Reading Critic.pptx
Reading Critic.pptxReading Critic.pptx
Reading Critic.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
MIL Intro- 1.pptx
MIL Intro- 1.pptxMIL Intro- 1.pptx
MIL Intro- 1.pptx
 
LESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.ppt
LESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.pptLESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.ppt
LESSON-2-GETTING-STARTED-MICROSOFT-EXCEL.ppt
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
billofrights-new2014-140125193548-phpapp02.pptx
billofrights-new2014-140125193548-phpapp02.pptxbillofrights-new2014-140125193548-phpapp02.pptx
billofrights-new2014-140125193548-phpapp02.pptx
 
Lesson 1 - Politics.pptx
Lesson 1 - Politics.pptxLesson 1 - Politics.pptx
Lesson 1 - Politics.pptx
 
group 3 pt.pptx
group 3 pt.pptxgroup 3 pt.pptx
group 3 pt.pptx
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

THREATS.pptx

Editor's Notes

  1. Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer. Generally, software is considered malware based on the intent of the creator rather than its actual features. Malware creation is on the rise due to the sheer volume of new types created daily and the lure of money that can be made through organized Internet crime. Malware was originally created as experiments and pranks, but eventually led to vandalism and destruction of targeted machines. Today, much of malware is created for profit through forced advertising (adware), stealing sensitive information (spyware), spreading email spam or child pornography (zombie computers), or to extort money (ransomware). Various factors can make computers more vulnerable to malware attacks, including defects in the operating system design, having all of the computers on a network run the same OS, giving users to much permissions or just using the Windows OS (due to its popularity, it gets the most malware written for it). The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be cautious when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.
  2. A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the "boot" sector of the hard drive.
  3. In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
  4. In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
  5. In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
  6. Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process. The software may generate two types of revenue: one is for the display of the advertisement and another on a "pay-per-click" basis, if the user clicks on the advertisement. The software may implement advertisements in a variety of ways, including a static box display, a banner display, full screen, a video, pop-up ad or in some other form.
  7. Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.
  8. When not referring to the tasty potted meat product, spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers.
  9. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.