Z Score,T Score, Percential Rank and Box Plot Graph
INTERNET THREAT
1. INTERNET THREAT
A web threat is any threat that uses the World Wide Web to
facilitate cybercrime. Web threats use multiple types of malware and
fraud, all of which utilize HTTP or HTTPS protocols, but may also
employ other protocols and components, such as links in email or
IM, or malware attachments or on servers that access the Web.
They benefit cybercriminals by stealing information for subsequent
sale and help absorb infected PCs into botnet.
Web threats pose a broad range of risks, including financial
damages, identity that, loss of confidential information/data, theft of
network resources, damaged brand/personal reputation, and
erosion of consumer confidence in e-commerce and online banking
It is a type of threat related to information technology (IT). The IT
risk, i.e. risk affecting has gained and increasing impact on society
due to the spread of IT processes
Contents
•1Delivery methods
•2Growth of web threats
•3Examples
•4Prevention and detection
•5See also
3. PHISHING
Phishing is a form of social engineering
attack, in which the criminal impersonates a
trustworthy entity while requesting sensitive
information of the victim.
4. RANSOMWARE
Ransomware is malware that can lock a device
or encrypt its contents in order to extort
money from the owner. In return, operators of
the malicious code promise – of course,
without any guarantees – to restore access to
the affected machine or data.
5. MALWARE
Malware is a combination of two words –
"malicious" and "software". This umbrella term
describes any form of malicious code, regardless
of the way it afflicts victims, how it behaves or
what damage it causes.
6. SPAM
Spam is any form of unrequested
communication sent in bulk (Unsolicited Bulk
Email, or UBE). Its most frequent form is
a commercial email sent to a large number of
addresses (Unsolicited Commercial Email, or
UCE), but “spamming” is also possible via instant
messages, texts (SMS), social media or even
voicemail. Sending spam is illegal in most
jurisdictions.
7. FIREWALL
In computer networks, firewalls block or allow
network traffic, based on a set of predefined or
dynamic rules and policies. They protect
networks and computers against intrusion from
potentially dangerous black-hats as well as from
attacks that might enable them to take over the
devices and misuse them for malicious
purposes.