SlideShare a Scribd company logo
Safety, Security
and Ethics
2
Dangers on
the Internet
Email Spam
3
4
Also known as junk email, it is usually
unsolicited commercial email sent from
one source with identical message sent
to multiple recipients. Although some
Of them are not harmful, deleting
them one by one will eat up
your time and clog your email.
5
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware). Spammer is the
term used to a person who creates
Electronic spam.
6
Spamming is projected to continue
because it is a cheap means of
advertising. In addition, many
countries do not have laws to punish
spammers.
Email Spoofing
7
8
This refers to deceitful email practice in
which the sender address is changed,
so that it would appear to have come
from a different source usually
someone you know.
9
Email spoofing is usually used by
spammers to hide the origin of
the spam.
10
This refers to deceitful email practice in
which the sender address is changed,
so that it would appear to have come
from a different source usually
someone you know.
Phishing
11
12
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and
credit card by making it appear as
if it comes from trustworthy
source.
13
Phishing is usually done by email or
other similar means using a popular
entity such as Yahoo, Google, and
financial institutions to lure you to
their website.
14
Internet users would think that they are
accessing a genuine website and
through this way, a phisher would be
able to gather sensitive information
from internet account user.
Pharming
15
16
This is a dangerous hacker attack on a
website which directs all traffic to that
website to another fictitious website.
The main object of pharming is to
obtain username and passwords,
as well as credit card and
17
financial information, and use these to
steal their money electronically or use
the credit card of the victims. Pharming
is a major concern of many online
bamking and elecronic commerce
transactions, which would
18
compromise many of their client accounts
as well as the business. Anti-virus and
anti-spyware software cannot prevent and
protect one from pharming.
Spyware (Key Logger)
19
20
This is a computer that installed covertly
on a personal computer to collect
information or even take control over the
computer without the knownledge of the
user.
21
A spyware program would be able to
monitor and collect information about the
user and his internet habits and
practices.It is known that spyware
programs also affect the performance and
settings of the computer.
22
Major anti-virus companies have
incorporated in their products anti-
spyware programs, and many internet-
based companies have offered anti –
spyware programs for a fee , and some
are free.
23
But you must be careful which one to use
to ensure your protection.
Computer Worm
24
25
This is a dangerous computer
program that replicates itself through
network. Some worms delete files,
others disrupt the network function
and still, others send junk mail from
infected computer.
26
Computer worm usually spreads by
exploiting weaknesses in operating
system, and manufacturers of this
software regularly send free updates
to clients to prevent the spread of
worms.
27
They usually spread on their own
without attaching to a program or file.
Users should not run attachment or
open emails from unknown or
suspicious sources, delete them
immediately.
28
Anti-virus, anti-spyware, and use
of firewall helps to prevent worm
attacks, but it must be updated
regularly to ensure current
prevention and control.
Trojan Horse
29
30
This is a form of malicious software
(malware) fronting to perform a
good task, but covertly performs
undesirable function with the
intension of entering the computer
without the user’s consent.
31
Once the malware is installed in the
computer, the Trojan horse can
disable the computer’s defences
opening it to unauthorized entry.
Once the malware is installed in the
computer,
32
the trojan horse can disable the
computer’s defences opening it to
authorized entry. It can erase data,
can allow access of the victim’s
computer ,and can corrupt files.
Computer Virus
33
34
This is a program that duplicates itself
and then infects the computer. It spreads
like a real biological virus, wherein it
attaches itself to a host program and
infect other computers if it received by a
computer through the internet.
35
The virus can also transferred by the
use of removal storage media such
as diskette, CD, flash drives, memory
cards, and others. Damage by the
computer virus maybe mild to severe.
36
Data loss and cripped funtionality of the
computer have created specialist to
combat deadly computer viruses.Many
antivirus programs are effective against
the threats, but should be regularly
updated to remain successful in
prevention and fight against these
computer viruses.
Hacker
37
38
This is a person who is able to enter and
control other people’s computer without
authorization. A hacker is able to enter
another’s computer, usually vandalizes
the victim’s website. Steals personal
information,obtains intellectual property
and perform credit card fraud.
39
Jan Allen Manuel
Earl Rameses Mudlong
Jewel Monique Norte
France Lee Julian
Buenaluz Corpuz

More Related Content

What's hot

Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionguest71ebd38
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
sourav newatia
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
Dhrumit Patel
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
HTS Hosting
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Avinash Navin
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
JohnnAlvarez
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
Hafiza Abas
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 

What's hot (17)

Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
C 7
C 7C 7
C 7
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 

Similar to Safety, Security and Ethics

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Johnlery Guzman
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
Mar Soriano
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
Mar Soriano
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
ToleraYadessaGonfa
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
QondileRamokgadi
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
ChSheraz3
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 

Similar to Safety, Security and Ethics (20)

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Safety, Security and Ethics

  • 4. 4 Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. Although some Of them are not harmful, deleting them one by one will eat up your time and clog your email.
  • 5. 5 Dangerous spams carry virus like Trojan horse and other malicious software (malware). Spammer is the term used to a person who creates Electronic spam.
  • 6. 6 Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have laws to punish spammers.
  • 8. 8 This refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know.
  • 9. 9 Email spoofing is usually used by spammers to hide the origin of the spam.
  • 10. 10 This refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know.
  • 12. 12 This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card by making it appear as if it comes from trustworthy source.
  • 13. 13 Phishing is usually done by email or other similar means using a popular entity such as Yahoo, Google, and financial institutions to lure you to their website.
  • 14. 14 Internet users would think that they are accessing a genuine website and through this way, a phisher would be able to gather sensitive information from internet account user.
  • 16. 16 This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main object of pharming is to obtain username and passwords, as well as credit card and
  • 17. 17 financial information, and use these to steal their money electronically or use the credit card of the victims. Pharming is a major concern of many online bamking and elecronic commerce transactions, which would
  • 18. 18 compromise many of their client accounts as well as the business. Anti-virus and anti-spyware software cannot prevent and protect one from pharming.
  • 20. 20 This is a computer that installed covertly on a personal computer to collect information or even take control over the computer without the knownledge of the user.
  • 21. 21 A spyware program would be able to monitor and collect information about the user and his internet habits and practices.It is known that spyware programs also affect the performance and settings of the computer.
  • 22. 22 Major anti-virus companies have incorporated in their products anti- spyware programs, and many internet- based companies have offered anti – spyware programs for a fee , and some are free.
  • 23. 23 But you must be careful which one to use to ensure your protection.
  • 25. 25 This is a dangerous computer program that replicates itself through network. Some worms delete files, others disrupt the network function and still, others send junk mail from infected computer.
  • 26. 26 Computer worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software regularly send free updates to clients to prevent the spread of worms.
  • 27. 27 They usually spread on their own without attaching to a program or file. Users should not run attachment or open emails from unknown or suspicious sources, delete them immediately.
  • 28. 28 Anti-virus, anti-spyware, and use of firewall helps to prevent worm attacks, but it must be updated regularly to ensure current prevention and control.
  • 30. 30 This is a form of malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intension of entering the computer without the user’s consent.
  • 31. 31 Once the malware is installed in the computer, the Trojan horse can disable the computer’s defences opening it to unauthorized entry. Once the malware is installed in the computer,
  • 32. 32 the trojan horse can disable the computer’s defences opening it to authorized entry. It can erase data, can allow access of the victim’s computer ,and can corrupt files.
  • 34. 34 This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to a host program and infect other computers if it received by a computer through the internet.
  • 35. 35 The virus can also transferred by the use of removal storage media such as diskette, CD, flash drives, memory cards, and others. Damage by the computer virus maybe mild to severe.
  • 36. 36 Data loss and cripped funtionality of the computer have created specialist to combat deadly computer viruses.Many antivirus programs are effective against the threats, but should be regularly updated to remain successful in prevention and fight against these computer viruses.
  • 38. 38 This is a person who is able to enter and control other people’s computer without authorization. A hacker is able to enter another’s computer, usually vandalizes the victim’s website. Steals personal information,obtains intellectual property and perform credit card fraud.
  • 39. 39 Jan Allen Manuel Earl Rameses Mudlong Jewel Monique Norte France Lee Julian Buenaluz Corpuz