SlideShare a Scribd company logo
1 of 11
Download to read offline
Online Crimes
and Hazards
Lesson 10:
GROUP 10
• Hacking
• Viruses
• Spamming
• Frauds and Scams
• Cyber Stalking
Insights and highlights for:
Lesson Outline
SOCIAL MEDIA | QUARTERLY REPORT
Hacking
Hacking is unauthorized use of me elses computer or online
account.
E-mail hacking is one of the most common types of online
hacking because it is where most information on a user's online
accounts is able to enter your E-mail account. Once a hacker is
able to enter mail account, he or she would be avail to view
your personal information and access your other online
accounts, giving him the power to do unauthorized transactions
or activities through your account.
SOCIAL MEDIA | QUARTERLY REPORT
Viruses
SOCIAL MEDIA | QUARTERLY REPORT
Viruses a mentioned earlier, hacking can also
occur through computer viruses. A computer virus
is a computer program that spreads from one
computer to another computer and interferes with
computer operation. If your computer is infected
with a virus, it can corrupt or delete any data you
have stored or even delete everything on your
hard disk. Viruses are commonly spread through
attachments in e-mail messages, links in instant
messages, or through files and programs you
download online.
is a computer program that appears to be
an interesting or familiar application, file,
or emi aachmin but is only masquerading
as such or hiding malware that causes
damage when you click and run it.
Trojans can do a number of nasty things
on your computer, the least of which
tracks your browsing habits, but in severe
cases may even cause your computer
from functioning properly. They can be a
nuisance, frequenty making their
presence known.
Three of the most common types of computer virus:
SOCIAL MEDIA | QUARTERLY REPORT
TROJAN WORM
A worm is a small piece of software
that uses computer networks and
security flaws to replicate itself.
More complex than trojans, worms
usually attack kulti-user system
and can spread over a network of
computers through e-mail
circulation.
E-MAIL
VURUSES
An e-mail virus spreads as an
attachment to e-mail messages and
Mplicates itself by automatically
mailing itself to dozens of people in
the lictims e-mail address book.
A spam is the electronic equivalent of junk mail. Spamming is flooding message accounts over the Internet with
copies of the same message, mostly to advertise, campaign something, and distribute jokes or words of wisdom to
a lot of people at the same time. Spam costs very little to send, hence "spammers" use this method to advertise
their products, services, or schemes to as many people as possible. Below are some of the most common types of
spam and their definitions.
Spamming
SOCIAL MEDIA | QUARTERLY REPORT
When Spammed
SOCIAL MEDIA | QUARTERLY REPORT
You may not be able to totally avoid receiving spam
messages, but you can take the necessary precautions so
as not to be a victim of spam abuse. Here are some
pointers.
1. Be selective when responding to messages.
2. Be careful of signing up or posting to various websites.
3. Create e-mail filters.
4. Make sure not to aid in perpetuating forwarded
messages.
Frauds and Scams
There are many variations of frauds and scams on the Internet created by fake sellers who use computer
services to promote bogus services, products, and investment opportunities, among others. The
common goal is to fool you into giving away money and/or bank information. But you have to find a
balance between caution and adopting a go-for-it attitude. The overly cautious trait of people can
actually prevent them from finding new legitimate opportunities. Not everything suspicious you
encounter on the Internet is a scam. Some are actually worthwhile checking out.
1. If something is too good to be true, then most likely it is.
2. Be wary of products that are offered too cheap.
3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites.
4. Research will go a long way.
SOCIAL MEDIA | QUARTERLY REPORT
Cyber Stalking
SOCIAL MEDIA | QUARTERLY REPORT
Cyber stalking is the use of the Internet by an individual or a goup of
individuals to harass another individual, group of individuals,
o'organization. Cyber stalking can involve threats, identity theft, false
acuations, solicitation of minors for sexual purposes, and gathering of
information for harassment purposes. Cyber stalkers often meet or target
their icins through search engines, online forums, bulletin boards, chat
rooms, and social networks. They attempt to track or follow the victims
activity.
WORD BANK
Hacking
- unauthorized use of someone else's computer or online
account
Computer Virus
- a computer program that spreads from one computer to another and interferes with
computer operation
Trojan
- a computer program that appears to be an interesting or familiar application, file, or
e-mail attachment, but is only masquerading as such and causes damage when you
click and run it.
Worm
- a small piece of software that uses computer networks and security flaws to
replicate itself
Spamming
- a flooding of messaging accounts over the Internet with many copies of the same
message, mostly to advertise something to a lot of people at the same time
Black hat search engine optimization
- arguably unethical techniques that are used to get higher search rankings in an
unethical manner
Firewall
- system in a computer designed to prevent unauthorized access to or from a private
network
Multi-user system
- operating system or application software that allows simultaneous access by
multiple users of a computer
Cyber stalking
- the use of the Internet by an individual or a group organization
of individuals to harass another individual, group
SOCIAL MEDIA | QUARTERLY REPORT
Group 10:
Angelica Shane V. Mejia
Rica Mae G. Eñeja
Graciela Mae S. Mendones
Seth Andrie A. Reyes
SOCIAL MEDIA | QUARTERLY REPORT

More Related Content

Similar to Computer 10: Lesson 10 - Online Crimes and Hazards

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser77bda9
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptKeerthikaaThiyagaraj
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.pptJacobJose37
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSASASASA93
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...BUSHRASHAIKH804312
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt1A245MohitTitarmare
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser46d915
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptFarhanQuraishi4
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAshaVijay11
 
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHCyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHbhaimeresuresh
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptUmeshBansal18
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptArunBhagatt
 

Similar to Computer 10: Lesson 10 - Online Crimes and Hazards (20)

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHCyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Computer 10: Lesson 10 - Online Crimes and Hazards

  • 2. • Hacking • Viruses • Spamming • Frauds and Scams • Cyber Stalking Insights and highlights for: Lesson Outline SOCIAL MEDIA | QUARTERLY REPORT
  • 3. Hacking Hacking is unauthorized use of me elses computer or online account. E-mail hacking is one of the most common types of online hacking because it is where most information on a user's online accounts is able to enter your E-mail account. Once a hacker is able to enter mail account, he or she would be avail to view your personal information and access your other online accounts, giving him the power to do unauthorized transactions or activities through your account. SOCIAL MEDIA | QUARTERLY REPORT
  • 4. Viruses SOCIAL MEDIA | QUARTERLY REPORT Viruses a mentioned earlier, hacking can also occur through computer viruses. A computer virus is a computer program that spreads from one computer to another computer and interferes with computer operation. If your computer is infected with a virus, it can corrupt or delete any data you have stored or even delete everything on your hard disk. Viruses are commonly spread through attachments in e-mail messages, links in instant messages, or through files and programs you download online.
  • 5. is a computer program that appears to be an interesting or familiar application, file, or emi aachmin but is only masquerading as such or hiding malware that causes damage when you click and run it. Trojans can do a number of nasty things on your computer, the least of which tracks your browsing habits, but in severe cases may even cause your computer from functioning properly. They can be a nuisance, frequenty making their presence known. Three of the most common types of computer virus: SOCIAL MEDIA | QUARTERLY REPORT TROJAN WORM A worm is a small piece of software that uses computer networks and security flaws to replicate itself. More complex than trojans, worms usually attack kulti-user system and can spread over a network of computers through e-mail circulation. E-MAIL VURUSES An e-mail virus spreads as an attachment to e-mail messages and Mplicates itself by automatically mailing itself to dozens of people in the lictims e-mail address book.
  • 6. A spam is the electronic equivalent of junk mail. Spamming is flooding message accounts over the Internet with copies of the same message, mostly to advertise, campaign something, and distribute jokes or words of wisdom to a lot of people at the same time. Spam costs very little to send, hence "spammers" use this method to advertise their products, services, or schemes to as many people as possible. Below are some of the most common types of spam and their definitions. Spamming SOCIAL MEDIA | QUARTERLY REPORT
  • 7. When Spammed SOCIAL MEDIA | QUARTERLY REPORT You may not be able to totally avoid receiving spam messages, but you can take the necessary precautions so as not to be a victim of spam abuse. Here are some pointers. 1. Be selective when responding to messages. 2. Be careful of signing up or posting to various websites. 3. Create e-mail filters. 4. Make sure not to aid in perpetuating forwarded messages.
  • 8. Frauds and Scams There are many variations of frauds and scams on the Internet created by fake sellers who use computer services to promote bogus services, products, and investment opportunities, among others. The common goal is to fool you into giving away money and/or bank information. But you have to find a balance between caution and adopting a go-for-it attitude. The overly cautious trait of people can actually prevent them from finding new legitimate opportunities. Not everything suspicious you encounter on the Internet is a scam. Some are actually worthwhile checking out. 1. If something is too good to be true, then most likely it is. 2. Be wary of products that are offered too cheap. 3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites. 4. Research will go a long way. SOCIAL MEDIA | QUARTERLY REPORT
  • 9. Cyber Stalking SOCIAL MEDIA | QUARTERLY REPORT Cyber stalking is the use of the Internet by an individual or a goup of individuals to harass another individual, group of individuals, o'organization. Cyber stalking can involve threats, identity theft, false acuations, solicitation of minors for sexual purposes, and gathering of information for harassment purposes. Cyber stalkers often meet or target their icins through search engines, online forums, bulletin boards, chat rooms, and social networks. They attempt to track or follow the victims activity.
  • 10. WORD BANK Hacking - unauthorized use of someone else's computer or online account Computer Virus - a computer program that spreads from one computer to another and interferes with computer operation Trojan - a computer program that appears to be an interesting or familiar application, file, or e-mail attachment, but is only masquerading as such and causes damage when you click and run it. Worm - a small piece of software that uses computer networks and security flaws to replicate itself Spamming - a flooding of messaging accounts over the Internet with many copies of the same message, mostly to advertise something to a lot of people at the same time Black hat search engine optimization - arguably unethical techniques that are used to get higher search rankings in an unethical manner Firewall - system in a computer designed to prevent unauthorized access to or from a private network Multi-user system - operating system or application software that allows simultaneous access by multiple users of a computer Cyber stalking - the use of the Internet by an individual or a group organization of individuals to harass another individual, group SOCIAL MEDIA | QUARTERLY REPORT
  • 11. Group 10: Angelica Shane V. Mejia Rica Mae G. Eñeja Graciela Mae S. Mendones Seth Andrie A. Reyes SOCIAL MEDIA | QUARTERLY REPORT