SlideShare a Scribd company logo
1 of 23
1. MALWARE
Stands for malicious
software
1. MALWARE
A. VIRUS – a malicious program
designed to replicate itself and
transfer from one computer to
another either through the
Internet and local networks or
data storage like flash drives and
CDs.
1. MALWARE
B. WORM– a malicious program that
transfers from one computer to
another by any type of means. Often,
it uses a computer network to spread
itself. For example, the ILOVEYOU
worm(Love Bug Worm) created by a
Filipino.
1. MALWARE
C. TROJAN– a malicious program
that is disguised as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
1. MALWARE
C. TROJAN
* Rogue security software - tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his/her security but
in reality, they are not protected at
all.
1. MALWARE
D. SPYWARE– a program that runs in
the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
1. MALWARE
D. SPYWARE
* Keyloggers- used to record the
keystroke done by the users. This is
done to steal their password or any other
sensitive information. It can record
email, messages, or any information you
type using your keyboard.
1. MALWARE
E. ADWARE– a program
designed to send
you advertisements,
mostly as pop-ups.
2. SPAM
Unwanted email
mostly from bots or
advertisers. It can be
used to send malware.
3. PHISHING
It goal is to acquire sensitive personal
information like passwords and credit
card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit
card, or personal information.
3. PHISHING
Pharming – a more complicated
way of phishing where it
exploits the DNS (Domain
Name Service) system.
Internet Threats
Internet Threats
Internet Threats
Internet Threats

More Related Content

What's hot

Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyReygie Fabro
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skillsJonathan Jr Marcelino
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3alicelagajino
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creationFe Lanny Tejano
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 

What's hot (20)

Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creation
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 

Similar to Internet Threats

Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMarcJohnLumambas
 
Internet threats
Internet threatsInternet threats
Internet threatsGicelDelaCruz
 
Internet threats
Internet threatsInternet threats
Internet threatsrhustysambile
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9Ali Habeeb
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxMichael Montarde
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology EducationSummerpair77
 
Senior Education
Senior EducationSenior Education
Senior EducationSummerpair77
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsJeremy Flores
 

Similar to Internet Threats (20)

Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHS
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threats
Internet threatsInternet threats
Internet threats
 
MALWARE
MALWAREMALWARE
MALWARE
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computervirus
Computervirus Computervirus
Computervirus
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Senior Education
Senior EducationSenior Education
Senior Education
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 

More from Leelet1121

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteLeelet1121
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationLeelet1121
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk DancesLeelet1121
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An ArtLeelet1121
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of DanceLeelet1121
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Leelet1121
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportLeelet1121
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceLeelet1121
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole PersonLeelet1121
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challengesLeelet1121
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mindLeelet1121
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brainLeelet1121
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
3. Lesson 1.B
3. Lesson 1.B3. Lesson 1.B
3. Lesson 1.BLeelet1121
 
Sports ppt6
Sports ppt6Sports ppt6
Sports ppt6Leelet1121
 
Sports ppt5
Sports ppt5Sports ppt5
Sports ppt5Leelet1121
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesLeelet1121
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationLeelet1121
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports EventsLeelet1121
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
 

More from Leelet1121 (20)

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance Etiquette
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor Recreation
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk Dances
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An Art
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of Dance
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a Sport
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late Adolescence
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole Person
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challenges
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mind
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brain
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
3. Lesson 1.B
3. Lesson 1.B3. Lesson 1.B
3. Lesson 1.B
 
Sports ppt6
Sports ppt6Sports ppt6
Sports ppt6
 
Sports ppt5
Sports ppt5Sports ppt5
Sports ppt5
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor Activities
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor Recreation
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports Events
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 

Recently uploaded

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Internet Threats

  • 1.
  • 2.
  • 3. 1. MALWARE Stands for malicious software
  • 4. 1. MALWARE A. VIRUS – a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
  • 5.
  • 6. 1. MALWARE B. WORM– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm(Love Bug Worm) created by a Filipino.
  • 7.
  • 8. 1. MALWARE C. TROJAN– a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 9. 1. MALWARE C. TROJAN * Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
  • 10.
  • 11. 1. MALWARE D. SPYWARE– a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 12. 1. MALWARE D. SPYWARE * Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
  • 13.
  • 14. 1. MALWARE E. ADWARE– a program designed to send you advertisements, mostly as pop-ups.
  • 15.
  • 16. 2. SPAM Unwanted email mostly from bots or advertisers. It can be used to send malware.
  • 17.
  • 18. 3. PHISHING It goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
  • 19. 3. PHISHING Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.