SlideShare a Scribd company logo
1 of 21
ONLINE SAFETY, SECURITY, AND
ETHICS
ONLINE SAFETY AND SECURITY
The internet is a powerful tool for
learning and communicating
with people. However, there are
many dangers that you must
watch out for.
DANGERS ON THE INTERNET
Email Spam
Also known as junk email, it is
usually unsolicited commercial email
sent from one source with identical
message sent to multiple recipients.
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware).
Spammer is the term used to refer to a person who creates
electronic spam.
Spamming is projected to continue because it is a cheap means of
advertising. In addition, many countries do not Have laws to punish
spammers.
Email Spoofing
This refers to the deceitful email
practice in which the sender address
is changed, so that it would appear
to have come from a different
source usually someone you know.
Usually, the reply to address is the source of the email,
and when you unknowingly reply to it you would be
replying to the one who spoofed you.
Email Spoofing is usually used by spammers to hide the
origin of the spam.
Phishing
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and credit
card details by making it appear as if
it comes from a trustworthy source.
Phishing is usually done by email or
other similar means using a popular
entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions to lure
you to their website.
Internet users would think that they are
accessing a genuine website and through
this way, a phisher would be able to
gather sensitive information from the
internet account user.
Pharming
This is a dangerous hacker attack on
a website which directs all traffic to
that website to another fictitious
website. The main object of
pharming is to obtain username and
passwords, as well as credit card and
financial information, and use these
to steal their money electronically or
use the credit card of the victims.
Pharming is a major concern of
many online banking and
electronic commerce
transactions, which would
compromise many of their client
accounts as well as the business.
Antivirus and
anti-spyware
software cannot
prevent and
protect one from
pharming.
Spyware
This is a computer program
that is installed covertly on a
personal computer to collect
information or even take
control over the computer
without the knowledge of the
user.
A spyware program
would be able to
monitor and collect
information about the
user.
Computer Worm
This is a dangerous computer
program that replicates itself through
a network. Some worms delete files,
others disrupt the network and still,
others send junk mail from infected
computer.
Computer worm usually
spreads by exploiting
weaknesses in operating
system, and manufacturers of
this software regularly send
free updates to clients to
prevent the spread of the
worms.
Users should not run
attachments or open emails
from unknown or suspicious
sources, delete them
immediately.
Trojan Horse
This is a form of a malicious software
(malware) fronting to perform a good task,
but covertly performs undesirable function
with the intention of entering the computer
without the userā€™s consent.
Once the malware is installed in the
computer, the Trojan horse can disable the
computerā€™s defenses opening it to
unauthorized entry.
It can erase data, can allow access of the
victimā€™s computer, can corrupt files, and can
be used in Phishing for bank accounts.
Computer Virus
This is a program that duplicates itself
and then infects the computer. It
spreads like a real biological virus,
wherein it attaches itself to host a
program and infect other computers if
it is received by a computer through
the internet.
The virus can also be transferred by
the use of removable storage media
such as diskette, CD, flash drives,
memory cards, and others.
Damage by the computer virus may
be mild to severe.
Hacker
This is a person who is able to enter
and control other peopleā€™s computer
without authorization.
A hacker is able to enter anotherā€™s
computer, usually vandalizes the
victimā€™s website, steals personal
information, obtains intellectual
property, and performs credit card
fraud.
Firewalls are able to prevent entry by
hackers.
What are the Dangers on the Internet?
Email Spam
Email Spoofing
Phishing
Pharming
Spyware
Computer worm
Trojan Horse
Computer Virus
Hacker
Get Ā¼ sheet of paper
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the userā€™s consent.
5. This is a person who is able to enter and
control other peopleā€™s computer without
authorization.
Answer
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
-----Email Spam
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
------Computer virus
3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
----Phishing
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the userā€™s consent.
--- Trojan Horse
5. This is a person who is able to enter and
control other peopleā€™s computer without
authorization.
--- Hacker
Research about the
Commandments for
Computer Ethics
Home Activity

More Related Content

What's hot

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
Ā 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
Ā 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
Ā 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
Ā 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
Ā 

What's hot (20)

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
Ā 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Ā 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
Ā 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
Ā 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Ā 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ā 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
Ā 
What is malware
What is malwareWhat is malware
What is malware
Ā 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Ā 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Ā 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
Ā 
Types of malware
Types of malwareTypes of malware
Types of malware
Ā 
E-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptxE-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptx
Ā 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Ā 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
Ā 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Ā 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
Ā 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
Ā 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
Ā 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
Ā 

Viewers also liked (7)

Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Ā 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ā 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
Ā 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
Ā 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
Ā 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
Ā 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Ā 

Similar to Online safety, security, and ethics

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
jnallnmnl
Ā 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
Ā 
Computer Security
Computer SecurityComputer Security
Computer Security
Danz Magdaraog
Ā 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
Ā 

Similar to Online safety, security, and ethics (20)

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
Ā 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
Ā 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
Ā 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
Ā 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
Ā 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
Ā 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
Ā 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
Ā 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Ā 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
Ā 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
Ā 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
Ā 
Computer Security
Computer SecurityComputer Security
Computer Security
Ā 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Ā 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Ā 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Ā 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Ā 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
Ā 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Ā 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
Ā 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
Ā 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
Ā 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
Ā 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
Ā 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
Ā 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
Ā 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
Ā 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
Ā 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
Ā 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Ā 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
Ā 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
Ā 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
Ā 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
Ā 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
Ā 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
Ā 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
Ā 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
Ā 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
Ā 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
Ā 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
Ā 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
Ā 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
Ā 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
Ā 

Online safety, security, and ethics

  • 2. ONLINE SAFETY AND SECURITY The internet is a powerful tool for learning and communicating with people. However, there are many dangers that you must watch out for.
  • 3. DANGERS ON THE INTERNET Email Spam Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. Dangerous spams carry virus like Trojan horse and other malicious software (malware). Spammer is the term used to refer to a person who creates electronic spam. Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not Have laws to punish spammers.
  • 4. Email Spoofing This refers to the deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know. Usually, the reply to address is the source of the email, and when you unknowingly reply to it you would be replying to the one who spoofed you. Email Spoofing is usually used by spammers to hide the origin of the spam.
  • 5. Phishing This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions to lure you to their website. Internet users would think that they are accessing a genuine website and through this way, a phisher would be able to gather sensitive information from the internet account user.
  • 6. Pharming This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main object of pharming is to obtain username and passwords, as well as credit card and financial information, and use these to steal their money electronically or use the credit card of the victims. Pharming is a major concern of many online banking and electronic commerce transactions, which would compromise many of their client accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.
  • 7. Spyware This is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user. A spyware program would be able to monitor and collect information about the user.
  • 8. Computer Worm This is a dangerous computer program that replicates itself through a network. Some worms delete files, others disrupt the network and still, others send junk mail from infected computer. Computer worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software regularly send free updates to clients to prevent the spread of the worms. Users should not run attachments or open emails from unknown or suspicious sources, delete them immediately.
  • 9. Trojan Horse This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the userā€™s consent. Once the malware is installed in the computer, the Trojan horse can disable the computerā€™s defenses opening it to unauthorized entry. It can erase data, can allow access of the victimā€™s computer, can corrupt files, and can be used in Phishing for bank accounts.
  • 10. Computer Virus This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet. The virus can also be transferred by the use of removable storage media such as diskette, CD, flash drives, memory cards, and others. Damage by the computer virus may be mild to severe.
  • 11. Hacker This is a person who is able to enter and control other peopleā€™s computer without authorization. A hacker is able to enter anotherā€™s computer, usually vandalizes the victimā€™s website, steals personal information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.
  • 12. What are the Dangers on the Internet? Email Spam Email Spoofing Phishing Pharming Spyware Computer worm Trojan Horse Computer Virus Hacker
  • 13. Get Ā¼ sheet of paper 1. Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. 2. This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet.
  • 14. 3. This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. 4. This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the userā€™s consent.
  • 15. 5. This is a person who is able to enter and control other peopleā€™s computer without authorization.
  • 16. Answer 1. Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. -----Email Spam
  • 17. 2. This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet. ------Computer virus
  • 18. 3. This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. ----Phishing
  • 19. 4. This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the userā€™s consent. --- Trojan Horse
  • 20. 5. This is a person who is able to enter and control other peopleā€™s computer without authorization. --- Hacker
  • 21. Research about the Commandments for Computer Ethics Home Activity