2. ONLINE SAFETY AND SECURITY
The internet is a powerful tool for
learning and communicating
with people. However, there are
many dangers that you must
watch out for.
3. DANGERS ON THE INTERNET
Email Spam
Also known as junk email, it is
usually unsolicited commercial email
sent from one source with identical
message sent to multiple recipients.
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware).
Spammer is the term used to refer to a person who creates
electronic spam.
Spamming is projected to continue because it is a cheap means of
advertising. In addition, many countries do not Have laws to punish
spammers.
4. Email Spoofing
This refers to the deceitful email
practice in which the sender address
is changed, so that it would appear
to have come from a different
source usually someone you know.
Usually, the reply to address is the source of the email,
and when you unknowingly reply to it you would be
replying to the one who spoofed you.
Email Spoofing is usually used by spammers to hide the
origin of the spam.
5. Phishing
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and credit
card details by making it appear as if
it comes from a trustworthy source.
Phishing is usually done by email or
other similar means using a popular
entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions to lure
you to their website.
Internet users would think that they are
accessing a genuine website and through
this way, a phisher would be able to
gather sensitive information from the
internet account user.
6. Pharming
This is a dangerous hacker attack on
a website which directs all traffic to
that website to another fictitious
website. The main object of
pharming is to obtain username and
passwords, as well as credit card and
financial information, and use these
to steal their money electronically or
use the credit card of the victims.
Pharming is a major concern of
many online banking and
electronic commerce
transactions, which would
compromise many of their client
accounts as well as the business.
Antivirus and
anti-spyware
software cannot
prevent and
protect one from
pharming.
7. Spyware
This is a computer program
that is installed covertly on a
personal computer to collect
information or even take
control over the computer
without the knowledge of the
user.
A spyware program
would be able to
monitor and collect
information about the
user.
8. Computer Worm
This is a dangerous computer
program that replicates itself through
a network. Some worms delete files,
others disrupt the network and still,
others send junk mail from infected
computer.
Computer worm usually
spreads by exploiting
weaknesses in operating
system, and manufacturers of
this software regularly send
free updates to clients to
prevent the spread of the
worms.
Users should not run
attachments or open emails
from unknown or suspicious
sources, delete them
immediately.
9. Trojan Horse
This is a form of a malicious software
(malware) fronting to perform a good task,
but covertly performs undesirable function
with the intention of entering the computer
without the userās consent.
Once the malware is installed in the
computer, the Trojan horse can disable the
computerās defenses opening it to
unauthorized entry.
It can erase data, can allow access of the
victimās computer, can corrupt files, and can
be used in Phishing for bank accounts.
10. Computer Virus
This is a program that duplicates itself
and then infects the computer. It
spreads like a real biological virus,
wherein it attaches itself to host a
program and infect other computers if
it is received by a computer through
the internet.
The virus can also be transferred by
the use of removable storage media
such as diskette, CD, flash drives,
memory cards, and others.
Damage by the computer virus may
be mild to severe.
11. Hacker
This is a person who is able to enter
and control other peopleās computer
without authorization.
A hacker is able to enter anotherās
computer, usually vandalizes the
victimās website, steals personal
information, obtains intellectual
property, and performs credit card
fraud.
Firewalls are able to prevent entry by
hackers.
12. What are the Dangers on the Internet?
Email Spam
Email Spoofing
Phishing
Pharming
Spyware
Computer worm
Trojan Horse
Computer Virus
Hacker
13. Get Ā¼ sheet of paper
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
14. 3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the userās consent.
15. 5. This is a person who is able to enter and
control other peopleās computer without
authorization.
16. Answer
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
-----Email Spam
17. 2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
------Computer virus
18. 3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
----Phishing
19. 4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the userās consent.
--- Trojan Horse
20. 5. This is a person who is able to enter and
control other peopleās computer without
authorization.
--- Hacker