3. What information we should share or not on the internet?
What are the ways on how to check if the websites are trustworthy?
What are the 10 Core Rules of Netiquette?
5. ONLINE THREAT
Online threat is deemed any
malicious act
that attempts to gain access
to a computer network without
authorization or
permission from the owners.
6. The following are the top kinds of online threats that you should b
Phishing
Pharming
Internet Scam
Internet Robots
Malware
• adware
• spyware
• virus worms
• virus and worm
• Trojan or Trojan hor
• Ransomware
Spams
Cyberstalking
Cyberbullying
Spoofing
7. PHISHING
Phishing happens when an email is sent from an
internet criminal disguised as an email from a
legitimate,
trustworthy source. The message is meant to
lure you into
revealing sensitive or confidential information.
8. PHARMIMG
Pharming happens when a hacker (or “pharmer”)
directs an internet user to a fake website instead of a
legitimate one. These “spoofed” sites can capture a
victim’s confidential information, including
usernames, passwords, and credit card data, or
install malware on their computer. Pharmers usually
focus on websites in the financial sector, including
banks, online payment platforms, or other e-
9. INTERNET SCAM
generally refers to someone using internet services or
software to defraud or take advantage of victims,
typically for financial gain. Cybercriminals may
contact potential victims through personal or work
email accounts, social networking sites, dating apps,
or other methods in attempts to obtain financial or
other valuable personal information. Online scams
may come in various forms such as lottery scam,
charity fraud scams, job offer scams, and online
10. INTERNET ROBOTS
Internet robots are also known as spiders, crawlers,
and web bots. It is a software application that is
programmed to do certain tasks. Bots are automated,
which means they run according to their instructions
without a human user. Some bots are useful, such as
search engine bots that index content for search or
customer service bots that help users. Other bots are
"bad" and are programmed to break into user
accounts, scan the web for contact information for
12. Here are the most common offenders in the rogues’ gallery
Adware
(advertising supported software) is unwanted software designed
advertisements up on your screen. Example, pop-up ads and ban
Spyware is malware that secretly observes the computer
user’s activities without permission and reports it
to the software’s author.
Example is a keylogger.
Virus and Worms
are malwares that attach to another program and,
when executed—unintentionally by the user—replicates
itself by modifying other computer programs and
infecting them with its own bits of code
13. Here are the most common offenders in the rogues’ gallery
Trojan, or
Trojan horse
is one of the most dangerous malware types. It
usually represents itself
as something useful in order to trick you. Once it’s
on your system, the
attackers behind the Trojan gain unauthorized
access to the affected
computer. From there, Trojans can be used to steal
financial information
or install threats like viruses and ransomware.
Ransomwareis a form of malware that locks you out of your device
and/or encrypts
your files, then forces you to pay a ransom to get
them back.
14. SPAMS
Spams are unsolicited emails, instant messages
coming from recipients that are not granted
verifiable permission for the message to be
sent. Spam messages can be damaging if you
open or respond to it
17. SPOOFING
Spoofing happens when someone or something
etends to be something else to gain our confidenc
get access to our systems, steal data, steal mone
or spread malware.
18. Show Me How You Hashtag
Direction: Look at the following images and create a
hashtag based on the type of online threat
represented by each image. Write your answers in a
separate sheet of paper. (1 whole).