SlideShare a Scribd company logo
1 of 5
P7 unit 3
By luke thurston
phishing
• Phishing is someone trying to get credit card
details and passwords off other peoples
computer , people also use instant messaging
or email when the email is opened it takes
users to a site that, has malware on it or the
site may ask you for bank details or private
information. To stop these attacks you can use
anti-virus or spam filters or just don’t open
emails from, an unknown user on the links
inside the email from the unknown user.
Malware
• Malware is short for malicious software
malware can be something , that can be
installed onto the computer without the user
knowing its stops the computer from
functioning properly, malware carries virus
and worms, sometimes malware can disguise
it self as normal software. The ways to stop it
are to use anti-malware and firewalls.
viruses
• Viruses are malware program when inside the
computer it starts to duplicate, so when the
virus is deleted ten more are made it self and
it also hides it self from ,anti-virus and it takes
up hard drive space and CPU storage and slow
down the computer as a whole. The best way
to fix this anti-virus and firewalls.
spam
• Spam is a pointless email that may come
though to you it does not do, anything it just
takes up space on a networks bandwidth on
the internet spam, can also can be found on
online chat rooms sometimes. The best way to
stop spam is to ignore it or get spam filters
which deletes spam if detected.

More Related Content

What's hot

Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security roughNathaniel (Nate) Tuenge
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its preventiondavidmmc
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapperaschnapper
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Computer Security
Computer SecurityComputer Security
Computer Securitysecrettub
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Problem Solution Essay
Problem Solution EssayProblem Solution Essay
Problem Solution EssayPadme Amidala
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
Malware
MalwareMalware
MalwareHHSome
 
Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 

What's hot (19)

Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Problem Solution Essay
Problem Solution EssayProblem Solution Essay
Problem Solution Essay
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Internet security
Internet securityInternet security
Internet security
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Adware
AdwareAdware
Adware
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer
ComputerComputer
Computer
 
Malware
MalwareMalware
Malware
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 

Viewers also liked

How to install avast on a desktop
How to install avast on a desktop How to install avast on a desktop
How to install avast on a desktop lukecisco1
 
P3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemP3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemJamesBennett15
 
P5 connect hardware safely to a computer system
P5  connect hardware safely to a computer systemP5  connect hardware safely to a computer system
P5 connect hardware safely to a computer systemsophie07
 
P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3bambers11
 
P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsJamesBennett15
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pcAjay Jassi
 
How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1lukecisco1
 
Data flow in a computer
Data flow in a computerData flow in a computer
Data flow in a computerOriginalGSM
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systemslukasgoda456
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2OriginalGSM
 
Chapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of informationChapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of informationFrankie Jones
 
Types of computer
Types of computerTypes of computer
Types of computerOnline
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of ComputersDanielAtkinson96
 

Viewers also liked (16)

P7_M5
P7_M5P7_M5
P7_M5
 
How to install avast on a desktop
How to install avast on a desktop How to install avast on a desktop
How to install avast on a desktop
 
P3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemP3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer System
 
P5 connect hardware safely to a computer system
P5  connect hardware safely to a computer systemP5  connect hardware safely to a computer system
P5 connect hardware safely to a computer system
 
P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3
 
P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer Systems
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
 
How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
Data flow in a computer
Data flow in a computerData flow in a computer
Data flow in a computer
 
The purpose of different types of computer systems
The purpose of different types of computer systemsThe purpose of different types of computer systems
The purpose of different types of computer systems
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
Chapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of informationChapter 1 computer hardware and flow of information
Chapter 1 computer hardware and flow of information
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of Computers
 
Types of computers
Types of computersTypes of computers
Types of computers
 

Similar to P7 unit 3

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxTier3MD
 

Similar to P7 unit 3 (20)

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Viruses
VirusesViruses
Viruses
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

P7 unit 3

  • 1. P7 unit 3 By luke thurston
  • 2. phishing • Phishing is someone trying to get credit card details and passwords off other peoples computer , people also use instant messaging or email when the email is opened it takes users to a site that, has malware on it or the site may ask you for bank details or private information. To stop these attacks you can use anti-virus or spam filters or just don’t open emails from, an unknown user on the links inside the email from the unknown user.
  • 3. Malware • Malware is short for malicious software malware can be something , that can be installed onto the computer without the user knowing its stops the computer from functioning properly, malware carries virus and worms, sometimes malware can disguise it self as normal software. The ways to stop it are to use anti-malware and firewalls.
  • 4. viruses • Viruses are malware program when inside the computer it starts to duplicate, so when the virus is deleted ten more are made it self and it also hides it self from ,anti-virus and it takes up hard drive space and CPU storage and slow down the computer as a whole. The best way to fix this anti-virus and firewalls.
  • 5. spam • Spam is a pointless email that may come though to you it does not do, anything it just takes up space on a networks bandwidth on the internet spam, can also can be found on online chat rooms sometimes. The best way to stop spam is to ignore it or get spam filters which deletes spam if detected.