SlideShare a Scribd company logo
1 of 39
Safety, Security
and Ethics
2
Dangers on
the Internet
Email Spam
3
4
Also known as junk email, it is usually
unsolicited commercial email sent from
one source with identical message sent
to multiple recipients. Although some
Of them are not harmful, deleting
them one by one will eat up
your time and clog your email.
5
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware). Spammer is the
term used to a person who creates
Electronic spam.
6
Spamming is projected to continue
because it is a cheap means of
advertising. In addition, many
countries do not have laws to punish
spammers.
Email Spoofing
7
8
This refers to deceitful email practice in
which the sender address is changed,
so that it would appear to have come
from a different source usually
someone you know.
9
Email spoofing is usually used by
spammers to hide the origin of
the spam.
10
This refers to deceitful email practice in
which the sender address is changed,
so that it would appear to have come
from a different source usually
someone you know.
Phishing
11
12
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and
credit card by making it appear as
if it comes from trustworthy
source.
13
Phishing is usually done by email or
other similar means using a popular
entity such as Yahoo, Google, and
financial institutions to lure you to
their website.
14
Internet users would think that they are
accessing a genuine website and
through this way, a phisher would be
able to gather sensitive information
from internet account user.
Pharming
15
16
This is a dangerous hacker attack on a
website which directs all traffic to that
website to another fictitious website.
The main object of pharming is to
obtain username and passwords,
as well as credit card and
17
financial information, and use these to
steal their money electronically or use
the credit card of the victims. Pharming
is a major concern of many online
bamking and elecronic commerce
transactions, which would
18
compromise many of their client accounts
as well as the business. Anti-virus and
anti-spyware software cannot prevent and
protect one from pharming.
Spyware (Key Logger)
19
20
This is a computer that installed covertly
on a personal computer to collect
information or even take control over the
computer without the knownledge of the
user.
21
A spyware program would be able to
monitor and collect information about the
user and his internet habits and
practices.It is known that spyware
programs also affect the performance and
settings of the computer.
22
Major anti-virus companies have
incorporated in their products anti-
spyware programs, and many internet-
based companies have offered anti –
spyware programs for a fee , and some
are free.
23
But you must be careful which one to use
to ensure your protection.
Computer Worm
24
25
This is a dangerous computer
program that replicates itself through
network. Some worms delete files,
others disrupt the network function
and still, others send junk mail from
infected computer.
26
Computer worm usually spreads by
exploiting weaknesses in operating
system, and manufacturers of this
software regularly send free updates
to clients to prevent the spread of
worms.
27
They usually spread on their own
without attaching to a program or file.
Users should not run attachment or
open emails from unknown or
suspicious sources, delete them
immediately.
28
Anti-virus, anti-spyware, and use
of firewall helps to prevent worm
attacks, but it must be updated
regularly to ensure current
prevention and control.
Trojan Horse
29
30
This is a form of malicious software
(malware) fronting to perform a
good task, but covertly performs
undesirable function with the
intension of entering the computer
without the user’s consent.
31
Once the malware is installed in the
computer, the Trojan horse can
disable the computer’s defences
opening it to unauthorized entry.
Once the malware is installed in the
computer,
32
the trojan horse can disable the
computer’s defences opening it to
authorized entry. It can erase data,
can allow access of the victim’s
computer ,and can corrupt files.
Computer Virus
33
34
This is a program that duplicates itself
and then infects the computer. It spreads
like a real biological virus, wherein it
attaches itself to a host program and
infect other computers if it received by a
computer through the internet.
35
The virus can also transferred by the
use of removal storage media such
as diskette, CD, flash drives, memory
cards, and others. Damage by the
computer virus maybe mild to severe.
36
Data loss and cripped funtionality of the
computer have created specialist to
combat deadly computer viruses.Many
antivirus programs are effective against
the threats, but should be regularly
updated to remain successful in
prevention and fight against these
computer viruses.
Hacker
37
38
This is a person who is able to enter and
control other people’s computer without
authorization. A hacker is able to enter
another’s computer, usually vandalizes
the victim’s website. Steals personal
information,obtains intellectual property
and perform credit card fraud.
39
Jan Allen Manuel
Earl Rameses Mudlong
Jewel Monique Norte
France Lee Julian
Buenaluz Corpuz

More Related Content

What's hot

Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionguest71ebd38
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)marie120206
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 

What's hot (18)

Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 

Similar to Safety, Security and Ethics (Empowerment Technologies)

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxToleraYadessaGonfa
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crimeQondileRamokgadi
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 

Similar to Safety, Security and Ethics (Empowerment Technologies) (20)

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Recently uploaded

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Safety, Security and Ethics (Empowerment Technologies)

  • 4. 4 Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. Although some Of them are not harmful, deleting them one by one will eat up your time and clog your email.
  • 5. 5 Dangerous spams carry virus like Trojan horse and other malicious software (malware). Spammer is the term used to a person who creates Electronic spam.
  • 6. 6 Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have laws to punish spammers.
  • 8. 8 This refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know.
  • 9. 9 Email spoofing is usually used by spammers to hide the origin of the spam.
  • 10. 10 This refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know.
  • 12. 12 This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card by making it appear as if it comes from trustworthy source.
  • 13. 13 Phishing is usually done by email or other similar means using a popular entity such as Yahoo, Google, and financial institutions to lure you to their website.
  • 14. 14 Internet users would think that they are accessing a genuine website and through this way, a phisher would be able to gather sensitive information from internet account user.
  • 16. 16 This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main object of pharming is to obtain username and passwords, as well as credit card and
  • 17. 17 financial information, and use these to steal their money electronically or use the credit card of the victims. Pharming is a major concern of many online bamking and elecronic commerce transactions, which would
  • 18. 18 compromise many of their client accounts as well as the business. Anti-virus and anti-spyware software cannot prevent and protect one from pharming.
  • 20. 20 This is a computer that installed covertly on a personal computer to collect information or even take control over the computer without the knownledge of the user.
  • 21. 21 A spyware program would be able to monitor and collect information about the user and his internet habits and practices.It is known that spyware programs also affect the performance and settings of the computer.
  • 22. 22 Major anti-virus companies have incorporated in their products anti- spyware programs, and many internet- based companies have offered anti – spyware programs for a fee , and some are free.
  • 23. 23 But you must be careful which one to use to ensure your protection.
  • 25. 25 This is a dangerous computer program that replicates itself through network. Some worms delete files, others disrupt the network function and still, others send junk mail from infected computer.
  • 26. 26 Computer worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software regularly send free updates to clients to prevent the spread of worms.
  • 27. 27 They usually spread on their own without attaching to a program or file. Users should not run attachment or open emails from unknown or suspicious sources, delete them immediately.
  • 28. 28 Anti-virus, anti-spyware, and use of firewall helps to prevent worm attacks, but it must be updated regularly to ensure current prevention and control.
  • 30. 30 This is a form of malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intension of entering the computer without the user’s consent.
  • 31. 31 Once the malware is installed in the computer, the Trojan horse can disable the computer’s defences opening it to unauthorized entry. Once the malware is installed in the computer,
  • 32. 32 the trojan horse can disable the computer’s defences opening it to authorized entry. It can erase data, can allow access of the victim’s computer ,and can corrupt files.
  • 34. 34 This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to a host program and infect other computers if it received by a computer through the internet.
  • 35. 35 The virus can also transferred by the use of removal storage media such as diskette, CD, flash drives, memory cards, and others. Damage by the computer virus maybe mild to severe.
  • 36. 36 Data loss and cripped funtionality of the computer have created specialist to combat deadly computer viruses.Many antivirus programs are effective against the threats, but should be regularly updated to remain successful in prevention and fight against these computer viruses.
  • 38. 38 This is a person who is able to enter and control other people’s computer without authorization. A hacker is able to enter another’s computer, usually vandalizes the victim’s website. Steals personal information,obtains intellectual property and perform credit card fraud.
  • 39. 39 Jan Allen Manuel Earl Rameses Mudlong Jewel Monique Norte France Lee Julian Buenaluz Corpuz