SlideShare a Scribd company logo
A trip to ICT and Society
By: Group 4 (ROW 4) ICT-TLE
Grade 7-Newton
Members will follow via discussion INFECTED!!!
SPYWARE
A trip to ICT and Society
INFECTED!!!PLEASE STAND BY...
To begin the course, click on one of the hyperlinks:
VIRUS WORMS TROJANS
PHISHING SPAMMING
VIRUSES: INFECTION
SPREADS
A computer virus is a
type of malware that,
when executed,
replicates by inserting
copies of itself into the
computer or network
directly.
WORMS: INFECTION
MULTIPLIES
A computer worm is a
standalone malware c
omputer program that
replicates itself in
order to spread to
other computers.
TROJANS: INFECTION IS
STEALTHED
A Trojan horse
or Trojan is a non-
self-replicating
type of malware
program containing
malicious code.
SPYWARE: THE FBI IS
WATCHING
Spyware is a software
aiding a person or
organization to collect
data from a person,
unsuspecting the
application installed.
PHISHING AND SPOOFING:
LEGITIMATE THREATS
Phishing is the
collection of data
from users accessing a
“legitimate” website.
Spoofing is falsifying
documents.
SPAMMING: FLOODED
INBOX
Spamming is the
process of delivering
non-sensical
messages to people,
and can also carry an
infected attachment.
Are you protected?
• The mentioned security risks often come from
the internet database.
• Keep yourself protected using an anti-virus
program
• Copyright Infringement is a crime. This
Presentation is “All Rights Rserved 2014”
• ILOVEYOU, sometimes referred to as Love Letter, was a computer
worm that attacked tens of millions of Windows personal
computers on and after 5 May 2000 local time in
the Philippines when it started spreading as an email message with
the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-
FOR-YOU.txt.vbs".
• On 5 May, 2000, two young Filipino computer programmers named
Reonel Ramones and Onel de Guzman became targets of a criminal
investigation by agents of the Philippines' National Bureau of
Investigation (NBI). They were the creators of the virus that infected
over 50 M computers in 10 days, that the Pentagon and British
Parliament shut down their e-mail servers.
Important info...
(6X6 Rule not implemented...sorry )

More Related Content

What's hot

Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
Tami Brass
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
Sourav Verma
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Internet threats
Internet threatsInternet threats
Internet threats
AngelicaMaliwat
 
Malware
MalwareMalware
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
 
One of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksOne of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networks
Abaram Network Solutions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Dark Side
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
allisterm
 
virus
  virus  virus
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
Universitas Pembangunan Panca Budi
 
Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
UltraUploader
 
Hacking
HackingHacking
Hacking
blues_mfi
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
Er aditya kumar jha
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 

What's hot (19)

Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
MALWARE
MALWAREMALWARE
MALWARE
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Malware
MalwareMalware
Malware
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
One of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksOne of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
virus
  virus  virus
virus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Computervirus
ComputervirusComputervirus
Computervirus
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
 
Hacking
HackingHacking
Hacking
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 

Similar to A Trip to ICT and Society Series 1 : INFECTED! PART 1

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Internet threat
Internet threatInternet threat
Internet threat
ShekainaLiwanag1
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
ShekainaLiwanag1
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
Ali Habeeb
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
mastermind07
 
Internet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraInternet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz Orara
Christian Ranz Orara
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
Atuk4
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
adni_shadah
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
Michael Montarde
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
vasanthimuniasamy
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
Avinash627658
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
Computer virus
Computer virusComputer virus
Computer virus
karniksingh
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Dark Side
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Internet threats
Internet threatsInternet threats
Internet threats
GicelDelaCruz
 

Similar to A Trip to ICT and Society Series 1 : INFECTED! PART 1 (20)

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Internet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraInternet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz Orara
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Internet threats
Internet threatsInternet threats
Internet threats
 

More from ianpoblete13

Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
ianpoblete13
 
Signal number 5: Meteorological Outcomes
Signal number 5: Meteorological OutcomesSignal number 5: Meteorological Outcomes
Signal number 5: Meteorological Outcomes
ianpoblete13
 
Power of the internet PART 3
Power of the internet PART 3Power of the internet PART 3
Power of the internet PART 3
ianpoblete13
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
ianpoblete13
 
Power of the internet PART 1
Power of the internet PART 1Power of the internet PART 1
Power of the internet PART 1
ianpoblete13
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
ianpoblete13
 

More from ianpoblete13 (6)

Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
 
Signal number 5: Meteorological Outcomes
Signal number 5: Meteorological OutcomesSignal number 5: Meteorological Outcomes
Signal number 5: Meteorological Outcomes
 
Power of the internet PART 3
Power of the internet PART 3Power of the internet PART 3
Power of the internet PART 3
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
Power of the internet PART 1
Power of the internet PART 1Power of the internet PART 1
Power of the internet PART 1
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
 

Recently uploaded

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

A Trip to ICT and Society Series 1 : INFECTED! PART 1

  • 1.
  • 2. A trip to ICT and Society By: Group 4 (ROW 4) ICT-TLE Grade 7-Newton Members will follow via discussion INFECTED!!!
  • 3. SPYWARE A trip to ICT and Society INFECTED!!!PLEASE STAND BY... To begin the course, click on one of the hyperlinks: VIRUS WORMS TROJANS PHISHING SPAMMING
  • 4. VIRUSES: INFECTION SPREADS A computer virus is a type of malware that, when executed, replicates by inserting copies of itself into the computer or network directly.
  • 5. WORMS: INFECTION MULTIPLIES A computer worm is a standalone malware c omputer program that replicates itself in order to spread to other computers.
  • 6. TROJANS: INFECTION IS STEALTHED A Trojan horse or Trojan is a non- self-replicating type of malware program containing malicious code.
  • 7. SPYWARE: THE FBI IS WATCHING Spyware is a software aiding a person or organization to collect data from a person, unsuspecting the application installed.
  • 8. PHISHING AND SPOOFING: LEGITIMATE THREATS Phishing is the collection of data from users accessing a “legitimate” website. Spoofing is falsifying documents.
  • 9. SPAMMING: FLOODED INBOX Spamming is the process of delivering non-sensical messages to people, and can also carry an infected attachment.
  • 10. Are you protected? • The mentioned security risks often come from the internet database. • Keep yourself protected using an anti-virus program • Copyright Infringement is a crime. This Presentation is “All Rights Rserved 2014”
  • 11. • ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER- FOR-YOU.txt.vbs". • On 5 May, 2000, two young Filipino computer programmers named Reonel Ramones and Onel de Guzman became targets of a criminal investigation by agents of the Philippines' National Bureau of Investigation (NBI). They were the creators of the virus that infected over 50 M computers in 10 days, that the Pentagon and British Parliament shut down their e-mail servers. Important info... (6X6 Rule not implemented...sorry )