SlideShare a Scribd company logo
INTERNET THREATS
1. MALWARE
 stands for malicious software.
5 TYPES OF MALWARE
a. VIRUS- a malicious program
designed to replicate itself
and transfer from one
computer to another (
internet, local networks, FDs,
CDs, etc.)
5 TYPES OF MALWARE
b. WORM- a malicious program
that transfer from one computer
to another by any types of
means.
Ex. ILOVEYOU Worm
5 TYPES OF MALWARE
c. TROJAN- a malicious program
that disguises as a useful
program but once downloaded
or installed, leaves your PC
unprotected and allows hackers
to get your information.
5 TYPES OF MALWARE
d. SPYWARE- a program that runs in
the background without you
knowing it ( thus called “spy”). It
has the ability to monitor what you
are currently doing and typing
through key logging.
5 TYPES OF MALWARE
e. ADWARE- a program designed
to send you advertisements,
mostly as pop-ups.
2. SPAM
 an unwanted email mostly
from bots or advertisers. It can
be use to send malware.
3. PHISHING
 an unwanted acquisition of
sensitive personal information
like passwords and credit card
details.
4. BOTNET
 group of compromise
computer connected to a
network (“zombie”).
5. DENIAL OF SERVICE ATTACK
 disrupts computer access to
internet service.
5 TYPES OF MALWARE
d. SPYWARE- a program that runs in
the background without you
knowing it ( thus called “spy”). It
has the ability to monitor what you
are currently doing and typing
through key logging.
Presented by:
Maninang, Cathy M.
Castillo, Anna Marie Q.
Dela Cruz, Gicel F.
Galang, Angelu M.

More Related Content

What's hot

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
Juan Miguel Palero
 
Malware ppt
Malware pptMalware ppt
Malware ppt
Faiz Khan
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
HadilAlHaj
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
web browser ppt
web browser pptweb browser ppt
web browser ppt
Shivalika Singh
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
Juvy Novicio
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
Sid1256
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 

What's hot (20)

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
web browser ppt
web browser pptweb browser ppt
web browser ppt
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Phishing
PhishingPhishing
Phishing
 

Similar to Internet threats

Internet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraInternet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz Orara
Christian Ranz Orara
 
Internet threats
Internet threatsInternet threats
Internet threats
rhustysambile
 
Internet threat
Internet threatInternet threat
Internet threat
ShekainaLiwanag1
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
ShekainaLiwanag1
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Computer virus
Computer virusComputer virus
Computer virus
arif srk
 
Malware
MalwareMalware
Malware
zelkan19
 
Malware
MalwareMalware
Malware
zelkan19
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
Avinash627658
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
Kalpana Dangol
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
Ali Habeeb
 
Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHS
MarcJohnLumambas
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Dark Side
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 

Similar to Internet threats (20)

Internet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz OraraInternet Threats by Christian Ranz Orara
Internet Threats by Christian Ranz Orara
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHS
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Internet threats

  • 2. 1. MALWARE  stands for malicious software.
  • 3. 5 TYPES OF MALWARE a. VIRUS- a malicious program designed to replicate itself and transfer from one computer to another ( internet, local networks, FDs, CDs, etc.)
  • 4. 5 TYPES OF MALWARE b. WORM- a malicious program that transfer from one computer to another by any types of means. Ex. ILOVEYOU Worm
  • 5. 5 TYPES OF MALWARE c. TROJAN- a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 6. 5 TYPES OF MALWARE d. SPYWARE- a program that runs in the background without you knowing it ( thus called “spy”). It has the ability to monitor what you are currently doing and typing through key logging.
  • 7. 5 TYPES OF MALWARE e. ADWARE- a program designed to send you advertisements, mostly as pop-ups.
  • 8. 2. SPAM  an unwanted email mostly from bots or advertisers. It can be use to send malware.
  • 9. 3. PHISHING  an unwanted acquisition of sensitive personal information like passwords and credit card details.
  • 10. 4. BOTNET  group of compromise computer connected to a network (“zombie”).
  • 11. 5. DENIAL OF SERVICE ATTACK  disrupts computer access to internet service.
  • 12. 5 TYPES OF MALWARE d. SPYWARE- a program that runs in the background without you knowing it ( thus called “spy”). It has the ability to monitor what you are currently doing and typing through key logging.
  • 13. Presented by: Maninang, Cathy M. Castillo, Anna Marie Q. Dela Cruz, Gicel F. Galang, Angelu M.