SlideShare a Scribd company logo
1 of 11
A trip to ICT and Society
By: Group 4 (ROW 4) ICT-TLE
Grade 7-Newton
Members will follow via discussion INFECTED!!!
SPYWARE
A trip to ICT and Society
INFECTED!!!PLEASE STAND BY...
To begin the course, click on one of the hyperlinks:
VIRUS WORMS TROJANS
PHISHING SPAMMING
VIRUSES: INFECTION
SPREADS
A computer virus is a
type of malware that,
when executed,
replicates by inserting
copies of itself into the
computer or network
directly.
WORMS: INFECTION
MULTIPLIES
A computer worm is a
standalone malware c
omputer program that
replicates itself in
order to spread to
other computers.
TROJANS: INFECTION IS
STEALTHED
A Trojan horse
or Trojan is a non-
self-replicating
type of malware
program containing
malicious code.
SPYWARE: THE FBI IS
WATCHING
Spyware is a software
aiding a person or
organization to collect
data from a person,
unsuspecting the
application installed.
PHISHING AND SPOOFING:
LEGITIMATE THREATS
Phishing is the
collection of data
from users accessing a
“legitimate” website.
Spoofing is falsifying
documents.
SPAMMING: FLOODED
INBOX
Spamming is the
process of delivering
non-sensical
messages to people,
and can also carry an
infected attachment.
Are you protected?
• The mentioned security risks often come from
the internet database.
• Keep yourself protected using an anti-virus
program
• Copyright Infringement is a crime. This
Presentation is “All Rights Rserved 2014”
• ILOVEYOU, sometimes referred to as Love Letter, was a computer
worm that attacked tens of millions of Windows personal
computers on and after 5 May 2000 local time in
the Philippines when it started spreading as an email message with
the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-
FOR-YOU.txt.vbs".
• On 5 May, 2000, two young Filipino computer programmers named
Reonel Ramones and Onel de Guzman became targets of a criminal
investigation by agents of the Philippines' National Bureau of
Investigation (NBI). They were the creators of the virus that infected
over 50 M computers in 10 days, that the Pentagon and British
Parliament shut down their e-mail servers.
Important info...
(6X6 Rule not implemented...sorry )

More Related Content

What's hot

Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
One of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksOne of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksAbaram Network Solutions
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)allisterm
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesUltraUploader
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 

What's hot (19)

Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
MALWARE
MALWAREMALWARE
MALWARE
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Malware
MalwareMalware
Malware
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
One of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksOne of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
virus
  virus  virus
virus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Computervirus
ComputervirusComputervirus
Computervirus
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
 
Hacking
HackingHacking
Hacking
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 

Similar to A Trip to ICT and Society Series 1 : INFECTED! PART 1

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
Internet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraInternet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraChristian Ranz Orara
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101Atuk4
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxMichael Montarde
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 

Similar to A Trip to ICT and Society Series 1 : INFECTED! PART 1 (20)

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Internet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraInternet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz Orara
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Internet threats
Internet threatsInternet threats
Internet threats
 

More from ianpoblete13

Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)ianpoblete13
 
Signal number 5: Meteorological Outcomes
Signal number 5: Meteorological OutcomesSignal number 5: Meteorological Outcomes
Signal number 5: Meteorological Outcomesianpoblete13
 
Power of the internet PART 3
Power of the internet PART 3Power of the internet PART 3
Power of the internet PART 3ianpoblete13
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
Power of the internet PART 1
Power of the internet PART 1Power of the internet PART 1
Power of the internet PART 1ianpoblete13
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internetianpoblete13
 

More from ianpoblete13 (6)

Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
 
Signal number 5: Meteorological Outcomes
Signal number 5: Meteorological OutcomesSignal number 5: Meteorological Outcomes
Signal number 5: Meteorological Outcomes
 
Power of the internet PART 3
Power of the internet PART 3Power of the internet PART 3
Power of the internet PART 3
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
Power of the internet PART 1
Power of the internet PART 1Power of the internet PART 1
Power of the internet PART 1
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

A Trip to ICT and Society Series 1 : INFECTED! PART 1

  • 1.
  • 2. A trip to ICT and Society By: Group 4 (ROW 4) ICT-TLE Grade 7-Newton Members will follow via discussion INFECTED!!!
  • 3. SPYWARE A trip to ICT and Society INFECTED!!!PLEASE STAND BY... To begin the course, click on one of the hyperlinks: VIRUS WORMS TROJANS PHISHING SPAMMING
  • 4. VIRUSES: INFECTION SPREADS A computer virus is a type of malware that, when executed, replicates by inserting copies of itself into the computer or network directly.
  • 5. WORMS: INFECTION MULTIPLIES A computer worm is a standalone malware c omputer program that replicates itself in order to spread to other computers.
  • 6. TROJANS: INFECTION IS STEALTHED A Trojan horse or Trojan is a non- self-replicating type of malware program containing malicious code.
  • 7. SPYWARE: THE FBI IS WATCHING Spyware is a software aiding a person or organization to collect data from a person, unsuspecting the application installed.
  • 8. PHISHING AND SPOOFING: LEGITIMATE THREATS Phishing is the collection of data from users accessing a “legitimate” website. Spoofing is falsifying documents.
  • 9. SPAMMING: FLOODED INBOX Spamming is the process of delivering non-sensical messages to people, and can also carry an infected attachment.
  • 10. Are you protected? • The mentioned security risks often come from the internet database. • Keep yourself protected using an anti-virus program • Copyright Infringement is a crime. This Presentation is “All Rights Rserved 2014”
  • 11. • ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER- FOR-YOU.txt.vbs". • On 5 May, 2000, two young Filipino computer programmers named Reonel Ramones and Onel de Guzman became targets of a criminal investigation by agents of the Philippines' National Bureau of Investigation (NBI). They were the creators of the virus that infected over 50 M computers in 10 days, that the Pentagon and British Parliament shut down their e-mail servers. Important info... (6X6 Rule not implemented...sorry )