SlideShare a Scribd company logo
1 of 26
INTERNET THREATS
1.
MALWARE
3.
PHISHING
2. SPAM
a. Virus
b. Worm
c. Trojan
d. Spyware
e. Adware
*Pharming
1.
MALWARE
 MALicious
softWARE.
a. Virus
 Malicious program designed to replicate
itself & transfer from one computer to
another either through the internet & local
networks or data storage like flash drives
and CD’s.
b. Worm
 A malicious program designed that
transfers from one computer to another by
any type of means, Often, it uses a
computer network to spread itself.
b. Worm
Onel de Guzman
The creator of one of the most
popular worm: ILOVEYOU
worm. (“Love bug worm”)
c. Trojan
 A malicious program disguised as a
useful program but once downloaded or
installed, leaves your PC unprotected &
allows hackers to get information.
c. Trojan
 ROGUE SECURITY SOFTWARE
tricks the user into posing that it is a
security software. But in reality they are
not protected at all.
d. Spyware
 Program that runs in the background
without you knowing it ( thus called
“spy”)
 Has the ability to monitor what you are
currently doing through keylogging.
d. Spyware
 Keyloggers
- used to record the keystroke done by
the user.
-done to steal password or any other
sensitive information
-can record email, messages, any info.
e. Adware
 Program designed to send you
advertisements, mostly as pop ups.
2. SPAM
 Unwanted email
mostly from bots or
advertisers.
3. PHISHING
 It’s goal is to acquire sensitive
personal information like
password & credit card details.
3. PHISHING
 Done by sending you email that
will direct the user to visit a website
& be asked to update his/her
username, password, credit card
details or personal information.
*Pharming
 A more complicated way of phishing
where it exploits DNS (Domain Name
Service)
THINK BEFORE
YOU CLICK!
COPYRIGHT
INFRINGEMENT
- As a responsible user of the
internet, you have to consider
that not everything out there is
free for you to use.
TIPS TO AVOID
COPYRIGHT
INFRINGEMENT
1. Understand
2. Be
responsible
3. Be Creative
4. Know the
Law
Fair use logo
TIPS IN
CONDUCTING
RESEARCH
ONLINE
1. Have a
question in mind
2. Narrow it
down
3. Advanced
Search
4. Look for
credible sources
5. Give Credit
Name of the Person or organization (the author of the information). Title of the
home page in italics (title is shown in the title bar but is sometimes missing or
unrelated). URL. Date last seen.
Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”
http://oleander.penz.com/random/bananalove.htm. Viewed on September 7,
2015
Proper Citation

More Related Content

What's hot

Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyReygie Fabro
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online EnvironmentAngelito Quiambao
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3alicelagajino
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Empowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsEmpowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsLany Lyn Magdaraog
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creationFe Lanny Tejano
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 

What's hot (20)

Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Empowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsEmpowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and Elements
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creation
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 

Similar to INTERNET THREATS: MALWARE, PHISHING & SPAM

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 

Similar to INTERNET THREATS: MALWARE, PHISHING & SPAM (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
What is malware
What is malwareWhat is malware
What is malware
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 

More from JazzyNF

[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
 
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENTJazzyNF
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLSJazzyNF
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICTJazzyNF
 
TLE 6-Common cattle breeds in asia, america and europe
TLE 6-Common cattle breeds in asia, america and europeTLE 6-Common cattle breeds in asia, america and europe
TLE 6-Common cattle breeds in asia, america and europeJazzyNF
 
MAPEH-ARTS-CLASSICAL ARTS AND MUSIC
MAPEH-ARTS-CLASSICAL ARTS AND MUSICMAPEH-ARTS-CLASSICAL ARTS AND MUSIC
MAPEH-ARTS-CLASSICAL ARTS AND MUSICJazzyNF
 
MAPEH-PH-VOLLEYBALL
MAPEH-PH-VOLLEYBALLMAPEH-PH-VOLLEYBALL
MAPEH-PH-VOLLEYBALLJazzyNF
 
MAPEH-MUSIC-VISAYAN MUSIC
MAPEH-MUSIC-VISAYAN MUSICMAPEH-MUSIC-VISAYAN MUSIC
MAPEH-MUSIC-VISAYAN MUSICJazzyNF
 
MAPEH-PH-OUTDOOR RECREATIONS
MAPEH-PH-OUTDOOR RECREATIONSMAPEH-PH-OUTDOOR RECREATIONS
MAPEH-PH-OUTDOOR RECREATIONSJazzyNF
 
MAPEH-HEALTH-CLASSIFICATION OF DRUGS
MAPEH-HEALTH-CLASSIFICATION OF DRUGSMAPEH-HEALTH-CLASSIFICATION OF DRUGS
MAPEH-HEALTH-CLASSIFICATION OF DRUGSJazzyNF
 
MAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
MAPEH-MUSIC-TRADITIONAL CHINESE MUSICMAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
MAPEH-MUSIC-TRADITIONAL CHINESE MUSICJazzyNF
 
MAPEH-PH-HEALTH RELATED COMPONENTS
MAPEH-PH-HEALTH RELATED COMPONENTSMAPEH-PH-HEALTH RELATED COMPONENTS
MAPEH-PH-HEALTH RELATED COMPONENTSJazzyNF
 
MAPEH-HEALTH-HOLISTIC HEALTH
MAPEH-HEALTH-HOLISTIC HEALTHMAPEH-HEALTH-HOLISTIC HEALTH
MAPEH-HEALTH-HOLISTIC HEALTHJazzyNF
 
MAPEH-HEALTH-SEXUALITY EDUCATION
MAPEH-HEALTH-SEXUALITY EDUCATIONMAPEH-HEALTH-SEXUALITY EDUCATION
MAPEH-HEALTH-SEXUALITY EDUCATIONJazzyNF
 
MAPEH-PH-SKILL RELATED FITNESS COMPONENTS
MAPEH-PH-SKILL RELATED FITNESS COMPONENTSMAPEH-PH-SKILL RELATED FITNESS COMPONENTS
MAPEH-PH-SKILL RELATED FITNESS COMPONENTSJazzyNF
 

More from JazzyNF (16)

[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
 
TLE 6-Common cattle breeds in asia, america and europe
TLE 6-Common cattle breeds in asia, america and europeTLE 6-Common cattle breeds in asia, america and europe
TLE 6-Common cattle breeds in asia, america and europe
 
MAPEH-ARTS-CLASSICAL ARTS AND MUSIC
MAPEH-ARTS-CLASSICAL ARTS AND MUSICMAPEH-ARTS-CLASSICAL ARTS AND MUSIC
MAPEH-ARTS-CLASSICAL ARTS AND MUSIC
 
MAPEH-PH-VOLLEYBALL
MAPEH-PH-VOLLEYBALLMAPEH-PH-VOLLEYBALL
MAPEH-PH-VOLLEYBALL
 
MAPEH-MUSIC-VISAYAN MUSIC
MAPEH-MUSIC-VISAYAN MUSICMAPEH-MUSIC-VISAYAN MUSIC
MAPEH-MUSIC-VISAYAN MUSIC
 
MAPEH-PH-OUTDOOR RECREATIONS
MAPEH-PH-OUTDOOR RECREATIONSMAPEH-PH-OUTDOOR RECREATIONS
MAPEH-PH-OUTDOOR RECREATIONS
 
MAPEH-HEALTH-CLASSIFICATION OF DRUGS
MAPEH-HEALTH-CLASSIFICATION OF DRUGSMAPEH-HEALTH-CLASSIFICATION OF DRUGS
MAPEH-HEALTH-CLASSIFICATION OF DRUGS
 
MAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
MAPEH-MUSIC-TRADITIONAL CHINESE MUSICMAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
MAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
 
MAPEH-PH-HEALTH RELATED COMPONENTS
MAPEH-PH-HEALTH RELATED COMPONENTSMAPEH-PH-HEALTH RELATED COMPONENTS
MAPEH-PH-HEALTH RELATED COMPONENTS
 
MAPEH-HEALTH-HOLISTIC HEALTH
MAPEH-HEALTH-HOLISTIC HEALTHMAPEH-HEALTH-HOLISTIC HEALTH
MAPEH-HEALTH-HOLISTIC HEALTH
 
MAPEH-HEALTH-SEXUALITY EDUCATION
MAPEH-HEALTH-SEXUALITY EDUCATIONMAPEH-HEALTH-SEXUALITY EDUCATION
MAPEH-HEALTH-SEXUALITY EDUCATION
 
MAPEH-PH-SKILL RELATED FITNESS COMPONENTS
MAPEH-PH-SKILL RELATED FITNESS COMPONENTSMAPEH-PH-SKILL RELATED FITNESS COMPONENTS
MAPEH-PH-SKILL RELATED FITNESS COMPONENTS
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

INTERNET THREATS: MALWARE, PHISHING & SPAM

  • 1. INTERNET THREATS 1. MALWARE 3. PHISHING 2. SPAM a. Virus b. Worm c. Trojan d. Spyware e. Adware *Pharming
  • 3.
  • 4. a. Virus  Malicious program designed to replicate itself & transfer from one computer to another either through the internet & local networks or data storage like flash drives and CD’s.
  • 5.
  • 6. b. Worm  A malicious program designed that transfers from one computer to another by any type of means, Often, it uses a computer network to spread itself.
  • 7. b. Worm Onel de Guzman The creator of one of the most popular worm: ILOVEYOU worm. (“Love bug worm”)
  • 8. c. Trojan  A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected & allows hackers to get information.
  • 9.
  • 10. c. Trojan  ROGUE SECURITY SOFTWARE tricks the user into posing that it is a security software. But in reality they are not protected at all.
  • 11. d. Spyware  Program that runs in the background without you knowing it ( thus called “spy”)  Has the ability to monitor what you are currently doing through keylogging.
  • 12. d. Spyware  Keyloggers - used to record the keystroke done by the user. -done to steal password or any other sensitive information -can record email, messages, any info.
  • 13. e. Adware  Program designed to send you advertisements, mostly as pop ups.
  • 14. 2. SPAM  Unwanted email mostly from bots or advertisers.
  • 15. 3. PHISHING  It’s goal is to acquire sensitive personal information like password & credit card details.
  • 16. 3. PHISHING  Done by sending you email that will direct the user to visit a website & be asked to update his/her username, password, credit card details or personal information.
  • 17. *Pharming  A more complicated way of phishing where it exploits DNS (Domain Name Service)
  • 20. - As a responsible user of the internet, you have to consider that not everything out there is free for you to use.
  • 21. TIPS TO AVOID COPYRIGHT INFRINGEMENT 1. Understand 2. Be responsible 3. Be Creative 4. Know the Law
  • 23.
  • 24. TIPS IN CONDUCTING RESEARCH ONLINE 1. Have a question in mind 2. Narrow it down 3. Advanced Search 4. Look for credible sources 5. Give Credit
  • 25.
  • 26. Name of the Person or organization (the author of the information). Title of the home page in italics (title is shown in the title bar but is sometimes missing or unrelated). URL. Date last seen. Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.” http://oleander.penz.com/random/bananalove.htm. Viewed on September 7, 2015 Proper Citation