INTERNET THREATS
1.
MALWARE
3.
PHISHING
2. SPAM
a. Virus
b. Worm
c. Trojan
d. Spyware
e. Adware
*Pharming
1.
MALWARE
 MALicious
softWARE.
a. Virus
 Malicious program designed to replicate
itself & transfer from one computer to
another either through the internet & local
networks or data storage like flash drives
and CD’s.
b. Worm
 A malicious program designed that
transfers from one computer to another by
any type of means, Often, it uses a
computer network to spread itself.
b. Worm
Onel de Guzman
The creator of one of the most
popular worm: ILOVEYOU
worm. (“Love bug worm”)
c. Trojan
 A malicious program disguised as a
useful program but once downloaded or
installed, leaves your PC unprotected &
allows hackers to get information.
c. Trojan
 ROGUE SECURITY SOFTWARE
tricks the user into posing that it is a
security software. But in reality they are
not protected at all.
d. Spyware
 Program that runs in the background
without you knowing it ( thus called
“spy”)
 Has the ability to monitor what you are
currently doing through keylogging.
d. Spyware
 Keyloggers
- used to record the keystroke done by
the user.
-done to steal password or any other
sensitive information
-can record email, messages, any info.
e. Adware
 Program designed to send you
advertisements, mostly as pop ups.
2. SPAM
 Unwanted email
mostly from bots or
advertisers.
3. PHISHING
 It’s goal is to acquire sensitive
personal information like
password & credit card details.
3. PHISHING
 Done by sending you email that
will direct the user to visit a website
& be asked to update his/her
username, password, credit card
details or personal information.
*Pharming
 A more complicated way of phishing
where it exploits DNS (Domain Name
Service)
THINK BEFORE
YOU CLICK!
COPYRIGHT
INFRINGEMENT
- As a responsible user of the
internet, you have to consider
that not everything out there is
free for you to use.
TIPS TO AVOID
COPYRIGHT
INFRINGEMENT
1. Understand
2. Be
responsible
3. Be Creative
4. Know the
Law
Fair use logo
TIPS IN
CONDUCTING
RESEARCH
ONLINE
1. Have a
question in mind
2. Narrow it
down
3. Advanced
Search
4. Look for
credible sources
5. Give Credit
Name of the Person or organization (the author of the information). Title of the
home page in italics (title is shown in the title bar but is sometimes missing or
unrelated). URL. Date last seen.
Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”
http://oleander.penz.com/random/bananalove.htm. Viewed on September 7,
2015
Proper Citation

[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS

  • 1.
    INTERNET THREATS 1. MALWARE 3. PHISHING 2. SPAM a.Virus b. Worm c. Trojan d. Spyware e. Adware *Pharming
  • 2.
  • 4.
    a. Virus  Maliciousprogram designed to replicate itself & transfer from one computer to another either through the internet & local networks or data storage like flash drives and CD’s.
  • 6.
    b. Worm  Amalicious program designed that transfers from one computer to another by any type of means, Often, it uses a computer network to spread itself.
  • 7.
    b. Worm Onel deGuzman The creator of one of the most popular worm: ILOVEYOU worm. (“Love bug worm”)
  • 8.
    c. Trojan  Amalicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected & allows hackers to get information.
  • 10.
    c. Trojan  ROGUESECURITY SOFTWARE tricks the user into posing that it is a security software. But in reality they are not protected at all.
  • 11.
    d. Spyware  Programthat runs in the background without you knowing it ( thus called “spy”)  Has the ability to monitor what you are currently doing through keylogging.
  • 12.
    d. Spyware  Keyloggers -used to record the keystroke done by the user. -done to steal password or any other sensitive information -can record email, messages, any info.
  • 13.
    e. Adware  Programdesigned to send you advertisements, mostly as pop ups.
  • 14.
    2. SPAM  Unwantedemail mostly from bots or advertisers.
  • 15.
    3. PHISHING  It’sgoal is to acquire sensitive personal information like password & credit card details.
  • 16.
    3. PHISHING  Doneby sending you email that will direct the user to visit a website & be asked to update his/her username, password, credit card details or personal information.
  • 17.
    *Pharming  A morecomplicated way of phishing where it exploits DNS (Domain Name Service)
  • 18.
  • 19.
  • 20.
    - As aresponsible user of the internet, you have to consider that not everything out there is free for you to use.
  • 21.
    TIPS TO AVOID COPYRIGHT INFRINGEMENT 1.Understand 2. Be responsible 3. Be Creative 4. Know the Law
  • 22.
  • 24.
    TIPS IN CONDUCTING RESEARCH ONLINE 1. Havea question in mind 2. Narrow it down 3. Advanced Search 4. Look for credible sources 5. Give Credit
  • 26.
    Name of thePerson or organization (the author of the information). Title of the home page in italics (title is shown in the title bar but is sometimes missing or unrelated). URL. Date last seen. Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.” http://oleander.penz.com/random/bananalove.htm. Viewed on September 7, 2015 Proper Citation