Artificial intelligence in the post-deep learning era
A Trip to ICT and Society Series 1 : INFECTED! PART 2
1.
2. A trip to ICT and Society
By: Group 2 ICT-TLE
Grade 7-Newton
Members will follow via discussion INFECTED!!!
3. SPYWARE
A trip to ICT and Society
INFECTED!!!PLEASE STAND BY...
To begin the course, click on one of the hyperlinks:
VIRUS WORMS TROJANS
PHISHING SPAMMING
4. VIRUSES: INFECTION
SPREADS
A computer virus is a
type of malware that,
when executed,
replicates by inserting
copies of itself into the
computer or network
directly.
6. TROJANS: INFECTION IS
STEALTHED
A Trojan horse
or Trojan is a non-
self-replicating
type of malware
program containing
malicious code.
7. SPYWARE: THE FBI IS
WATCHING
Spyware is a software
aiding a person or
organization to collect
data from a person,
unsuspecting the
application installed.
8. PHISHING AND SPOOFING:
LEGITIMATE THREATS
Phishing is the
collection of data
from users accessing a
“legitimate” website.
Spoofing is falsifying
documents.
10. Are you protected?
• The mentioned security risks often come from
the internet database.
• Keep yourself protected using an anti-virus
program
• Copyright Infringement is a crime. This
Presentation is “All Rights Rserved 2014”