2. • Hacking
• Viruses
• Spamming
• Frauds and Scams
• Cyber Stalking
Insights and highlights for:
Lesson Outline
SOCIAL MEDIA | QUARTERLY REPORT
3. Hacking
Hacking is unauthorized use of me elses computer or online
account.
E-mail hacking is one of the most common types of online
hacking because it is where most information on a user's online
accounts is able to enter your E-mail account. Once a hacker is
able to enter mail account, he or she would be avail to view
your personal information and access your other online
accounts, giving him the power to do unauthorized transactions
or activities through your account.
SOCIAL MEDIA | QUARTERLY REPORT
4. Viruses
SOCIAL MEDIA | QUARTERLY REPORT
Viruses a mentioned earlier, hacking can also
occur through computer viruses. A computer virus
is a computer program that spreads from one
computer to another computer and interferes with
computer operation. If your computer is infected
with a virus, it can corrupt or delete any data you
have stored or even delete everything on your
hard disk. Viruses are commonly spread through
attachments in e-mail messages, links in instant
messages, or through files and programs you
download online.
5. is a computer program that appears to be
an interesting or familiar application, file,
or emi aachmin but is only masquerading
as such or hiding malware that causes
damage when you click and run it.
Trojans can do a number of nasty things
on your computer, the least of which
tracks your browsing habits, but in severe
cases may even cause your computer
from functioning properly. They can be a
nuisance, frequenty making their
presence known.
Three of the most common types of computer virus:
SOCIAL MEDIA | QUARTERLY REPORT
TROJAN WORM
A worm is a small piece of software
that uses computer networks and
security flaws to replicate itself.
More complex than trojans, worms
usually attack kulti-user system
and can spread over a network of
computers through e-mail
circulation.
E-MAIL
VURUSES
An e-mail virus spreads as an
attachment to e-mail messages and
Mplicates itself by automatically
mailing itself to dozens of people in
the lictims e-mail address book.
6. A spam is the electronic equivalent of junk mail. Spamming is flooding message accounts over the Internet with
copies of the same message, mostly to advertise, campaign something, and distribute jokes or words of wisdom to
a lot of people at the same time. Spam costs very little to send, hence "spammers" use this method to advertise
their products, services, or schemes to as many people as possible. Below are some of the most common types of
spam and their definitions.
Spamming
SOCIAL MEDIA | QUARTERLY REPORT
7. When Spammed
SOCIAL MEDIA | QUARTERLY REPORT
You may not be able to totally avoid receiving spam
messages, but you can take the necessary precautions so
as not to be a victim of spam abuse. Here are some
pointers.
1. Be selective when responding to messages.
2. Be careful of signing up or posting to various websites.
3. Create e-mail filters.
4. Make sure not to aid in perpetuating forwarded
messages.
8. Frauds and Scams
There are many variations of frauds and scams on the Internet created by fake sellers who use computer
services to promote bogus services, products, and investment opportunities, among others. The
common goal is to fool you into giving away money and/or bank information. But you have to find a
balance between caution and adopting a go-for-it attitude. The overly cautious trait of people can
actually prevent them from finding new legitimate opportunities. Not everything suspicious you
encounter on the Internet is a scam. Some are actually worthwhile checking out.
1. If something is too good to be true, then most likely it is.
2. Be wary of products that are offered too cheap.
3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites.
4. Research will go a long way.
SOCIAL MEDIA | QUARTERLY REPORT
9. Cyber Stalking
SOCIAL MEDIA | QUARTERLY REPORT
Cyber stalking is the use of the Internet by an individual or a goup of
individuals to harass another individual, group of individuals,
o'organization. Cyber stalking can involve threats, identity theft, false
acuations, solicitation of minors for sexual purposes, and gathering of
information for harassment purposes. Cyber stalkers often meet or target
their icins through search engines, online forums, bulletin boards, chat
rooms, and social networks. They attempt to track or follow the victims
activity.
10. WORD BANK
Hacking
- unauthorized use of someone else's computer or online
account
Computer Virus
- a computer program that spreads from one computer to another and interferes with
computer operation
Trojan
- a computer program that appears to be an interesting or familiar application, file, or
e-mail attachment, but is only masquerading as such and causes damage when you
click and run it.
Worm
- a small piece of software that uses computer networks and security flaws to
replicate itself
Spamming
- a flooding of messaging accounts over the Internet with many copies of the same
message, mostly to advertise something to a lot of people at the same time
Black hat search engine optimization
- arguably unethical techniques that are used to get higher search rankings in an
unethical manner
Firewall
- system in a computer designed to prevent unauthorized access to or from a private
network
Multi-user system
- operating system or application software that allows simultaneous access by
multiple users of a computer
Cyber stalking
- the use of the Internet by an individual or a group organization
of individuals to harass another individual, group
SOCIAL MEDIA | QUARTERLY REPORT
11. Group 10:
Angelica Shane V. Mejia
Rica Mae G. Eñeja
Graciela Mae S. Mendones
Seth Andrie A. Reyes
SOCIAL MEDIA | QUARTERLY REPORT