INTERNET
THREATS
1. MALWARE
- Stands for
Malicious
Ware.
TYPES OF MALWARE
A.VIRUS
- A malicious
program designed
to replicates itself
and transfer from
one computer to
another (internet,
local network.
FDs, CDs, etc.)
B. WORM
- A malicious
program that
transfer from one
computer to
another by any
types of means.
Ex. ILOVEYOU
Worm
C. TROJAN
- A malicious program
that disguises as a
useful program but once
download or installed,
leaves your PC
unprotected and allows
hackers to get your
information.
D. SPYWARE
- A program that runs
in the background
without you knowing
it (thus called “spy”).
It has the ability to
monitor what you are
currently doing and
typing through
keylogging.
E. ADWARE
- A program
designed to send
you advertisement,
mostly as pop-ups.
2. SPAM
- An unwanted
email mostly from
bots or
advertisers. It can
be used to send
malware.
3. PHISHING
- An unwanted
acquisition of
sensitive personal
information like
password and
credit and detail.
4. BOTNET
- A group of
compromised
computer
connected to a
network
(“zombie”).
5. DOS Attack
- Disrupts computer
access to internet
service.
THANK YOU!
Credits to the owner of the pictures used.

Internet Threats

  • 1.
  • 2.
    1. MALWARE - Standsfor Malicious Ware.
  • 3.
  • 4.
    A.VIRUS - A malicious programdesigned to replicates itself and transfer from one computer to another (internet, local network. FDs, CDs, etc.)
  • 5.
    B. WORM - Amalicious program that transfer from one computer to another by any types of means. Ex. ILOVEYOU Worm
  • 6.
    C. TROJAN - Amalicious program that disguises as a useful program but once download or installed, leaves your PC unprotected and allows hackers to get your information.
  • 7.
    D. SPYWARE - Aprogram that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 8.
    E. ADWARE - Aprogram designed to send you advertisement, mostly as pop-ups.
  • 9.
    2. SPAM - Anunwanted email mostly from bots or advertisers. It can be used to send malware.
  • 10.
    3. PHISHING - Anunwanted acquisition of sensitive personal information like password and credit and detail.
  • 11.
    4. BOTNET - Agroup of compromised computer connected to a network (“zombie”).
  • 12.
    5. DOS Attack -Disrupts computer access to internet service.
  • 13.
    THANK YOU! Credits tothe owner of the pictures used.