SlideShare a Scribd company logo
1 of 14
Computer
Presentation
Topic: Internet fraud and
common modes of security
threats
By: Moiz Ahmed
Although some businesses use the terms data protection. data security and data
privacy, have different purposes:
Data protection safeguards information from loss through backup and recovery.
 Data security refers specifically to measures taken to protect the integrity of the
data itself against manipulation and malware. It provides defense from internal
and external threats.
 Data privacy refers to controlling access to the data, Organizations must
determine who has access to data. Understandably, a privacy breach can lead to
data security issues
Differences between data protection,
security, and privacy
What Is data privacy? Data
Privacy generally means the ability of a people to determine for themselves
when, how, and to what extent personal information about them is shared
with or communicated to others. This personal information can be one's
name, location, contact information, or online or world behavior, Just as
someone may wish to exclude people from a private conversation, many
online users want to contol or prevent certain types of personal data
collection. As Internet usage has increased over the years, so has the
importance of data privacy. Websites, applications, and social media
platforms often need to collect and store personal data about the uses of
provided services. However, some applications and platforms may exceed
users' expectations for data collection and usage, leaving users with more
privacy than they realized. Other apps and platforms may not place adequate
safeguards around the data they collect, which can result in ina data breach
that compromises user privacy.
Why is data privacy important?
 In many jurisdictions, privacy's considered afundamental human rights and
data protectionlaws exist to a quarry that right. Data privacy isalso important
because in order fr invaluableto be willing to engage online, they have to
trustthat their data will be handled withcate, Organizations use data
protectionpractices to demonstrate to their customersand users that can be
trusted with theirpersonal data.
Personal data can be misused in several ways ie if it is not kept private or if people
don't have the ability to control how their information is used:
 Criminals can use personal data to defraudor harass users.
 Entities may sell personal data to advertisersor other outside parties without
the userconsent, which can result in users receiving unwanted marketing or
advertising.
 When a person's activities are tracked and monitored, this may restrict their
ability to express themselves freely, especially under repressive governments.
For individuals, any of these outcomes can be harmful. For businesses, these
outcomes canirreparably harm their reputation, as well as resulting in fines,
sanctions, and other legal consequences. In addition to the reward implications
of privacy infringements, many people and countries hold that privacy has
intrinsic value that privacy is a human right fundamental to a free society, like
the right to free speech. Internet fraud can be defined as any type of a scheme
that uses one or more components of theInternet (e.g. chat, email, website) to
publish fraudulent solicitations, conduct fraudulent transactions, or transmit
proceeds obtained trough fraud.
Who are hackers?
Hackers are people who gain access to a computer and then carry out
activities like stealing data, changing information, and so on. These
activities are done without the knowledge of the original user. Hacking is
typically technical (like creating malvertising that deposits malware in a
drive-by attack requiring user interaction). But hackers can also use
psychology to trick the user into clicking on a malicious attachment or
providing personal data. These tactics arem referred to as “social
engineering.” in fact. it's accurate to characterize hacking as an over-
arching umbrella term for activity behind most if not all of the malware
and malicious cyberattacks on the computing public, businesses,
andgovernments. Becides social engineering and malvertising, common
hacking techniques include:
Botnets
 Browser hijacks
 Denial of service (DDoS) attacks
 Ransomware
 Rootkits
 Trojans
 Viruses
What is phishing?
 Phishing is a type of online fraud that involves tricking people into
providing sensitive information, such as passwords or credit card numbers,
by masquerading as trustworthy source. Phishing can be done through
email, social media, or malicious websites.
How does phishing work?
Phishing works by sending messages that looklike they are from a
legitimate company or website. Phishing messages will usually contain a
link that takes the user to a fake website that it looks like the real thing.
The user is then asked to enter personal information, such as their credit
card number. This information is then used to steal the person's identity or
to make fraudulent charges on their next card.
What is spyware?
 Spyware is loosely defined as malicious software designed to enter your
computer device, gather data about you, and forward it to a third party
without your consent. Spyware can also refer to legitimate software that
monitors your data for commercial purposes like advertising, however,
malicious spyware explicitly used to profit from stolen data. Whether
legitimate or based on fraud, spyware surveillance activity leaves you open
to data breaches and misuse of your private data, Spyware also affects
network and device performance, showing down daily user activities. By
becoming aware of how spyware works, you can avoid issues in enterprise
and personal use.
What does spyware do?
All spyware peeks into your data and all your computer activity —
whether authorized or not. However, many trusted computer services and
applications use “spyware-like" tracking tools. As such, the spyware
definition is reserved mostly for malicious applications nowadays.
Malicious spyware is a type of malware specifically installed without your
informed consent. Step-by-step, spyware will take the following actions on
your computer or mobile device:
 Infiltrate — via an app install package, malicious website, or file
attachment.
 Monitor and capture data — via keystrokes, screen captures, and other
tracking codes.
 Send stolen data — to the spyware author, to be used directly or sold to
other parties.
 In short, spyware communicates personal, confidential information
about you to an attacker. The information gathered might be reported
about your online browsing habits or purchases, but spyware codes can
also be modified to record more specific activities. Data compromised by
spyware often includes collecting confidential info such as:
Login credentials — passwords and usernames
Account PINs
Credit card numbers
Monitored keyboard strokes
Tracked browsing habits
Harvested email addresses
The methods by which spyware gets onto your computer and mobile
devices can vary.
What is adware?
 Adware refers to a type of malware that displays unwanted advertisements
on yourcomputer or device. Adware is commonlyactivated unknowingly
when users are tryingto install legitimate applications thatadware is
bundled with. While sometimes, the adware can be safe,some pop-up
windows intend to not only display advertisements but also collect data
and information to target you with customized adverts. In these cases,
adware can direct you to malicious websites and infected pages through
various advert links, putting you at risk of computer viruses.
How to detect adware?
The most common way to recognize adware is the appearance of pop-up
advertisements, and applications that you are unfamiliar with and on
browsers where they had not been displayed before. In some cases, the
adware can also cause changes to your browser, below are a few things to
look out for:
Lagging performance and eventual crashing
 Unrequested changes to your browser homepages
Appearance of new extensions and toolbars
Web pages not displaying properly
 Unwanted software installing

More Related Content

Similar to Internet Fraud and Security Threats Explained

Similar to Internet Fraud and Security Threats Explained (20)

Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Spyware
SpywareSpyware
Spyware
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security
Information securityInformation security
Information security
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Mobile security
Mobile securityMobile security
Mobile security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet EN
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

Recently uploaded

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 

Internet Fraud and Security Threats Explained

  • 1. Computer Presentation Topic: Internet fraud and common modes of security threats By: Moiz Ahmed
  • 2. Although some businesses use the terms data protection. data security and data privacy, have different purposes: Data protection safeguards information from loss through backup and recovery.  Data security refers specifically to measures taken to protect the integrity of the data itself against manipulation and malware. It provides defense from internal and external threats.  Data privacy refers to controlling access to the data, Organizations must determine who has access to data. Understandably, a privacy breach can lead to data security issues Differences between data protection, security, and privacy
  • 3. What Is data privacy? Data Privacy generally means the ability of a people to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others. This personal information can be one's name, location, contact information, or online or world behavior, Just as someone may wish to exclude people from a private conversation, many online users want to contol or prevent certain types of personal data collection. As Internet usage has increased over the years, so has the importance of data privacy. Websites, applications, and social media platforms often need to collect and store personal data about the uses of provided services. However, some applications and platforms may exceed users' expectations for data collection and usage, leaving users with more privacy than they realized. Other apps and platforms may not place adequate safeguards around the data they collect, which can result in ina data breach that compromises user privacy.
  • 4. Why is data privacy important?  In many jurisdictions, privacy's considered afundamental human rights and data protectionlaws exist to a quarry that right. Data privacy isalso important because in order fr invaluableto be willing to engage online, they have to trustthat their data will be handled withcate, Organizations use data protectionpractices to demonstrate to their customersand users that can be trusted with theirpersonal data. Personal data can be misused in several ways ie if it is not kept private or if people don't have the ability to control how their information is used:
  • 5.  Criminals can use personal data to defraudor harass users.  Entities may sell personal data to advertisersor other outside parties without the userconsent, which can result in users receiving unwanted marketing or advertising.  When a person's activities are tracked and monitored, this may restrict their ability to express themselves freely, especially under repressive governments. For individuals, any of these outcomes can be harmful. For businesses, these outcomes canirreparably harm their reputation, as well as resulting in fines, sanctions, and other legal consequences. In addition to the reward implications of privacy infringements, many people and countries hold that privacy has intrinsic value that privacy is a human right fundamental to a free society, like the right to free speech. Internet fraud can be defined as any type of a scheme that uses one or more components of theInternet (e.g. chat, email, website) to publish fraudulent solicitations, conduct fraudulent transactions, or transmit proceeds obtained trough fraud.
  • 6. Who are hackers? Hackers are people who gain access to a computer and then carry out activities like stealing data, changing information, and so on. These activities are done without the knowledge of the original user. Hacking is typically technical (like creating malvertising that deposits malware in a drive-by attack requiring user interaction). But hackers can also use psychology to trick the user into clicking on a malicious attachment or providing personal data. These tactics arem referred to as “social engineering.” in fact. it's accurate to characterize hacking as an over- arching umbrella term for activity behind most if not all of the malware and malicious cyberattacks on the computing public, businesses, andgovernments. Becides social engineering and malvertising, common hacking techniques include:
  • 7. Botnets  Browser hijacks  Denial of service (DDoS) attacks  Ransomware  Rootkits  Trojans  Viruses
  • 8. What is phishing?  Phishing is a type of online fraud that involves tricking people into providing sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy source. Phishing can be done through email, social media, or malicious websites.
  • 9. How does phishing work? Phishing works by sending messages that looklike they are from a legitimate company or website. Phishing messages will usually contain a link that takes the user to a fake website that it looks like the real thing. The user is then asked to enter personal information, such as their credit card number. This information is then used to steal the person's identity or to make fraudulent charges on their next card.
  • 10. What is spyware?  Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising, however, malicious spyware explicitly used to profit from stolen data. Whether legitimate or based on fraud, spyware surveillance activity leaves you open to data breaches and misuse of your private data, Spyware also affects network and device performance, showing down daily user activities. By becoming aware of how spyware works, you can avoid issues in enterprise and personal use.
  • 11. What does spyware do? All spyware peeks into your data and all your computer activity — whether authorized or not. However, many trusted computer services and applications use “spyware-like" tracking tools. As such, the spyware definition is reserved mostly for malicious applications nowadays. Malicious spyware is a type of malware specifically installed without your informed consent. Step-by-step, spyware will take the following actions on your computer or mobile device:  Infiltrate — via an app install package, malicious website, or file attachment.
  • 12.  Monitor and capture data — via keystrokes, screen captures, and other tracking codes.  Send stolen data — to the spyware author, to be used directly or sold to other parties.  In short, spyware communicates personal, confidential information about you to an attacker. The information gathered might be reported about your online browsing habits or purchases, but spyware codes can also be modified to record more specific activities. Data compromised by spyware often includes collecting confidential info such as: Login credentials — passwords and usernames Account PINs Credit card numbers Monitored keyboard strokes Tracked browsing habits Harvested email addresses The methods by which spyware gets onto your computer and mobile devices can vary.
  • 13. What is adware?  Adware refers to a type of malware that displays unwanted advertisements on yourcomputer or device. Adware is commonlyactivated unknowingly when users are tryingto install legitimate applications thatadware is bundled with. While sometimes, the adware can be safe,some pop-up windows intend to not only display advertisements but also collect data and information to target you with customized adverts. In these cases, adware can direct you to malicious websites and infected pages through various advert links, putting you at risk of computer viruses.
  • 14. How to detect adware? The most common way to recognize adware is the appearance of pop-up advertisements, and applications that you are unfamiliar with and on browsers where they had not been displayed before. In some cases, the adware can also cause changes to your browser, below are a few things to look out for: Lagging performance and eventual crashing  Unrequested changes to your browser homepages Appearance of new extensions and toolbars Web pages not displaying properly  Unwanted software installing