This document discusses various internet dangers including email spam, email spoofing, phishing, pharming, spyware, computer worms, Trojan horses, computer viruses, and hackers. Email spam refers to unsolicited commercial emails sent in bulk. Phishing involves deceiving users into providing private information through fraudulent emails or websites. Pharming redirects website traffic to fake sites. Spyware covertly monitors users without their knowledge. Computer worms self-replicate through networks and can delete files or disrupt systems. Trojan horses appear benign but have hidden malicious functions. Computer viruses replicate like biological viruses and can damage files and corrupt systems. Hackers access computers without authorization and sometimes steal information or vandalize sites. Regular software updates
4. 4
Also known as junk email, it is usually
unsolicited commercial email sent from
one source with identical message sent
to multiple recipients. Although some
Of them are not harmful, deleting
them one by one will eat up
your time and clog your email.
5. 5
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware). Spammer is the
term used to a person who creates
Electronic spam.
6. 6
Spamming is projected to continue
because it is a cheap means of
advertising. In addition, many
countries do not have laws to punish
spammers.
8. 8
This refers to deceitful email practice in
which the sender address is changed,
so that it would appear to have come
from a different source usually
someone you know.
10. 10
This refers to deceitful email practice in
which the sender address is changed,
so that it would appear to have come
from a different source usually
someone you know.
12. 12
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and
credit card by making it appear as
if it comes from trustworthy
source.
13. 13
Phishing is usually done by email or
other similar means using a popular
entity such as Yahoo, Google, and
financial institutions to lure you to
their website.
14. 14
Internet users would think that they are
accessing a genuine website and
through this way, a phisher would be
able to gather sensitive information
from internet account user.
16. 16
This is a dangerous hacker attack on a
website which directs all traffic to that
website to another fictitious website.
The main object of pharming is to
obtain username and passwords,
as well as credit card and
17. 17
financial information, and use these to
steal their money electronically or use
the credit card of the victims. Pharming
is a major concern of many online
bamking and elecronic commerce
transactions, which would
18. 18
compromise many of their client accounts
as well as the business. Anti-virus and
anti-spyware software cannot prevent and
protect one from pharming.
20. 20
This is a computer that installed covertly
on a personal computer to collect
information or even take control over the
computer without the knownledge of the
user.
21. 21
A spyware program would be able to
monitor and collect information about the
user and his internet habits and
practices.It is known that spyware
programs also affect the performance and
settings of the computer.
22. 22
Major anti-virus companies have
incorporated in their products anti-
spyware programs, and many internet-
based companies have offered anti –
spyware programs for a fee , and some
are free.
23. 23
But you must be careful which one to use
to ensure your protection.
25. 25
This is a dangerous computer
program that replicates itself through
network. Some worms delete files,
others disrupt the network function
and still, others send junk mail from
infected computer.
26. 26
Computer worm usually spreads by
exploiting weaknesses in operating
system, and manufacturers of this
software regularly send free updates
to clients to prevent the spread of
worms.
27. 27
They usually spread on their own
without attaching to a program or file.
Users should not run attachment or
open emails from unknown or
suspicious sources, delete them
immediately.
28. 28
Anti-virus, anti-spyware, and use
of firewall helps to prevent worm
attacks, but it must be updated
regularly to ensure current
prevention and control.
30. 30
This is a form of malicious software
(malware) fronting to perform a
good task, but covertly performs
undesirable function with the
intension of entering the computer
without the user’s consent.
31. 31
Once the malware is installed in the
computer, the Trojan horse can
disable the computer’s defences
opening it to unauthorized entry.
Once the malware is installed in the
computer,
32. 32
the trojan horse can disable the
computer’s defences opening it to
authorized entry. It can erase data,
can allow access of the victim’s
computer ,and can corrupt files.
34. 34
This is a program that duplicates itself
and then infects the computer. It spreads
like a real biological virus, wherein it
attaches itself to a host program and
infect other computers if it received by a
computer through the internet.
35. 35
The virus can also transferred by the
use of removal storage media such
as diskette, CD, flash drives, memory
cards, and others. Damage by the
computer virus maybe mild to severe.
36. 36
Data loss and cripped funtionality of the
computer have created specialist to
combat deadly computer viruses.Many
antivirus programs are effective against
the threats, but should be regularly
updated to remain successful in
prevention and fight against these
computer viruses.
38. 38
This is a person who is able to enter and
control other people’s computer without
authorization. A hacker is able to enter
another’s computer, usually vandalizes
the victim’s website. Steals personal
information,obtains intellectual property
and perform credit card fraud.