0% found this document useful (0 votes)
41 views17 pages

MODULE 4 - The Internet

Discuss how the Internet changed the world

Uploaded by

paulygonzaga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views17 pages

MODULE 4 - The Internet

Discuss how the Internet changed the world

Uploaded by

paulygonzaga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

ILOCOS SUR

POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE

THE INTERNET
MODULE
4
INTENDED LEARNING
At the end of the module, students will be able to:
 Trace the history of internet.
 Determine the major components of internet.
 Explain the role of internet in the modern world.
 Discuss the cybercrimes and internet threats.

LESSON PROPER

The Internet or “net” (network of network) is the largest computer


network in the world that connects billions of computer users. The word
internet comes from combination between “interconnection” and “network”.
Network is a collection of computers and devices connected via
communication channels and transmission media allow to share resources
(hardware, software, data, information). Generally, nobody owns the
internet.

Brief History of Internet


ARPA – Advanced Research Project Agency January 2, 1969 – started
an experimental computer network. Concept – No server, but equal
importance/participation to every computer in the network. Even if, one or
two nodes destroyed that will now affect the network. In 1982 the word
internet started. 1986 – First “free net” created in Case Western Reserve
University 1991: US government allowed business agencies to connect to
internet. Now all people can connect to the internet and improve their life
and work quality. The internet support various aspects in our life. Vinton
Gray Cerf ForMemRS is an American Internet pioneer and is recognized as
one of "the fathers of the Internet", sharing this title with TCP/IP co-
developer Bob Kahn.

MAJOR COMPONENTS OF THE INTERNET

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
1. Server - A server is a computer or system that provides resources, data,
services, or programs to other computers, known as clients, over a
network. Server is a computer program that provides service to another
computer program and its user.

In theory, whenever computers share resources with client machines,


they are considered servers. There are many types of servers, including web
servers, mail servers, and virtual servers.

Type of Servers:
 Application Server – a program in computer that provides the
business logic for an application program. Business logic in an
application server refers to the set of rules, processes, and
workflows that govern the behavior of an application or system. It
defines how data is processed, how tasks are performed, and how
different components of the application interact with each other.

 Web Server – A computer program that serves requested HTML


pages or files. A web server is software and hardware that
uses HTTP (Hypertext Transfer Protocol) and other protocols to
respond to client requests made over the World Wide Web. The
main job of a web server is to display website content
through storing, processing, and delivering webpages to
users.

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE

 Proxy Server – is a software that acts as an intermediary between


an endpoint device, such as computer and another server from
which a user is requesting.
A proxy server is a system or router that provides a gateway
between users and the internet. Therefore, it helps prevent cyber
attackers from entering a private network. It is a server, referred to
as an “intermediary” because it goes between end-users and the
web pages they visit online.

 Mail
Server – Is an application that receives incoming e-mail from local
users and remote senders and forward outgoing e-mail for delivery.
A mail server (sometimes called an email server) is a software
program that sends and receives email. Often, it is used as a
blanket term for both mail transfer agents (MTA) and mail delivery
agents (MDA), each of which perform a slightly different function.
Microsoft Exchange, Exim and Send mail are common examples of
mail server programs.

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE

 File Server – A file server is a computer responsible for the storage


and management of data files so that other computers on the same
network can access the files. It enables users to share information
over a network without having to physically transfer files.

 Policy Server – is a security component of a policy – based


network that provides authorization services and facilities tracking

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
and control of files. A policy server is a security component of a
policy-based network that provides authorization services and
facilitates tracking and control of files.

The policy server accepts access control requests, processes


them against a formal set of statements that define how the
network's resources are to be allocated among its clients (known as
the policy), and returns access control responses.

Policy Server Operations


The Policy Server provide access control and single sign-on. It
typically runs on a separate Windows or UNIX system, and performs
the following key security operations:
 Authentication - The Policy Server supports a range of
authentication methods. It can authenticate users based on
usernames and passwords, using tokens, using forms-based
authentication, and through public-key certificates.
 Authorization — The Policy Server is responsible for
managing and enforcing access control rules established by
Policy Server administrators. These rules define the
operations that are allowed for each protected resource.

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
 Administration — The Policy Server can be configured using
the Administrative UI. The Administration service of the Policy
Server is what enables the UI to record configuration
information in the Policy Store. The Policy Store is the
database that contains entitlement information.
 Accounting — The Policy Server generates log files that
contain auditing information about the events that occur
within the system.
 Health Monitoring — Policy Server provides health
monitoring components.

2. IP Address (INTERNET PROTOCOL) - An Internet Protocol (IP)


address is a unique numerical identifier for every device or network
that connects to the internet. Typically assigned by an internet service
provider (ISP), an IP address is an online device address used for
communicating across the internet.

Versions of IP Address:
 IPV4 - Internet Protocol version 4 - It is one of the core
protocols of standards-based internetworking methods in
the Internet and other packet-switched networks. IPv4 was
the first version deployed for production on SATNET in
1982 and on the ARPANET in January 1983. It is still used
to route most Internet traffic today, even with the ongoing
deployment of Internet Protocol version 6 (IPv6), its
successor. IPv4 uses a 32-bit address space which provides
4,294,967,296 unique addresses.

 IPV6 - Internet Protocol version 6 is the most recent


version of the Internet Protocol, the communications
protocol that provides an identification and location system
for computers on networks and routes traffic across the
Internet.

Types of IP Address
 Private IP Address is a unique IP number assigned to
every device that connects to your home internet network .
 Public IP Address is an IP address that can be accessed
directly over the internet and is assigned to your network
router by your internet service provider (ISP). Your personal
device also has a private IP that remains hidden when you
connect to the internet through your router's public IP.
 Static IP Address - As the name indicates, the static IP
addresses usually never change but they may be changed

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
as a result of network administration. They serve as a
permanent Internet address and provide a simple and
reliable way for the communication. From the static IP
address of a system, we can get many details such as the
continent, country, region, and city in which a computer is
located, The Internet Service Provider (ISP) that serves that
particular computer and non-technical information such as
precise latitude and longitude of the country, and the locale
of the computer.
 Dynamic IP address - are the second category. These are
temporary IP addresses. These IP addresses are assigned to
a computer when they get connected to the Internet each
time. They are actually borrowed from a pool of IP
addresses, shared over various computers. Since limited
number of static IP addresses are available, ISPs usually
reserve the portion of their assigned addresses for sharing
among their subscribers in this way.

3. BROWSERS – is an application program that provides a way to look


information on the web.

4. Domain Name System - is the phonebook of internet. We access


information online through domain names. When users type domain
names such as ‘google.com’ or ‘nytimes.com’ into web browsers, DNS
is responsible for finding the correct IP address for those sites.

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
a. Top-Level Domain - Internet domain names are organized by their
levels, with the higher levels on the right. For example, for the
domain “mail.twenty.net” the top-level domain is “net”, the second-
level domain is “twenty.net”, and the third-level domain is
“www.twenty.net”.

TLD USAGE
.bitnet Used for computers on the BITNET network.
.com Originally stood for “commercial” to indicate a site used
for commercial purposes, but it has since become the
most well-known top-level Internet domain and is now
used for any kind of site.
.int Used by “International” sites, usually NATO sites.
.edu Used for educational institutions like universities.
.gov Used for US Government sites.
.mil Used for US Military sites.
.net Originally intended for sites related to the Internet itself,
but now used for a wide variety of sites.
.org Originally intended for non-commercial “organizations”,
but now used for a wide variety of sites. Was managed
by the Internet Society for a while.

b. Second-Level Domain - Top-level Internet domains like “.com” are


shared by all the organizations in the domain. Second-level domain
names like “yahoo.com” and “livinginternet.com” are registered by
individuals and organizations. Second-level domains are the
addresses commonly used to host Internet applications like web
hosting and email addressing.

c. Third-level domains. Third-level Internet domain names are


created by those that own second-level domains. Third-level
domains can be used to set up individual domains for specific
purposes, such as a domain for web access and one for mail, or a
separate site for a special purpose:
www.livinginternet.com
mail.livinginternet.com
rareorchids.livinginternet.com
d. Country domains. Each country in the world has its own top-level
Internet domain with a unique alphabetic designation. A few
countries and example domains are shown below.

TLD Country Example site


.ae United Arab Emirates http://www.abudhabi.ae/

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
.at Austria http://www.austria.at/
.au Australia http://www.morning.com.au/
.bb Barbados https://www.gov.bb/
.bm Bermuda http://www.kbb.bm/
.br Brazil http://home.iis.com.br/
.ca Canada http://www.canoe.ca/
.ch Switzerland http://www.badminton.ch
.cl Chile http://www.santiago.cl/
.us United States http://www.co.maui.hi.us/

5. Internet Service Provider (ISP) – is an organization that provides


services for accessing, using or participating on the internet.

______________________
USES OF INTERNET IN THE MODERN WORLD
1. Communication - is all about how we talk to each other and share
important things. The Internet has email, instant messaging, social
media, online discussion forums, video, and voice calls for the major
portion of communication. The following tools make it easier for us to
connect, collaborate, and learn from one another.
Examples: Email, Social Media Platforms for Connecting, Online
Forums and Discussion Boards, Voice and Video Calls

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
2. E-Commerce - is about buying and selling things on the Internet. It’s
like shopping, but the Internet allows you to do it from your computer
or phone instead of going to a physical store. There are different parts
to it that we’ll talk about.
Examples: Online Shopping and Retail Websites, Payment
gateways and secure transactions,

3. Content Creation Using AI - With artificial intelligence (AI)


advancements, the Internet offers tools to generate content
autonomously. These AI-powered content generators can produce
articles, blog posts, product descriptions, and social media captions
based on specific input or prompts. Platforms like OpenAI’s ChatGPT
and Copy.ai leverage language models to generate human-like text,
providing content creators, marketers, and businesses with valuable
resources.

4. Online Banking - The Internet has been the most important factor in
introducing Net Banking. We can transfer money from our mobile
phones, tablets, laptops, etc. There is no need to visit the banks during
rush hours, which takes hours to complete a simple cash withdrawal or
money transfer. Banks close at the end of the day, but the Internet is
available 24/7. There is no stress of carrying bundles of cash on the
streets to deposit in the bank or after a withdrawal.

5. Education - Education in today’s world, the Internet has new ways for
our research and education. With the Internet, we can access online
databases and libraries, take online courses, collaborate with others,
find tutorials and resources, and attend classes online. The following
uses of the Internet have made learning more accessible and fun for
everyone.
Examples: Access to vast online libraries, E-learning and online
courses, Virtual Classrooms, and distance learning program

6. Entertainment - Entertainment and media have become much easier


and more fun because of the Internet. The following features of the
Internet showcase how we can create videos, share them online, and
watch any video we want.
Examples: Streaming of Movies, TV Shows, and music, Online
gaming and multiplayer platforms, Content Creators and
Influencers

7. Government Websites - The Internet provides access to government


websites, such as The White House, National Portal of India, National

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
Informatics Centre, etc., where you can find helpful information. These
websites are user-friendly to navigate and find what you need, even if
you’re not tech-savvy. For example, you can complete the tax filing
procedure online using the website of the Income Tax Department
instead of filling out physical tax forms at any administrative office.
Government websites also inform you of real-time updates on policy
changes or safety alerts.

8. Health - In today’s world, the Internet has changed how we care for
our health and well-being by making it easier to stay healthy, get the
support we need, and connect with others in similar situations. Let’s
look at some ways the Internet has made things easier for us:
Examples: Telemedicine and online consultation, Access to
medical information and resources, Health fitness apps and
platforms, Online communities, and support groups

9. Booking Tickets - Gone are the days of standing in long queues to


purchase movie tickets or making tedious phone calls to book flights
and hotels. With the Internet, we can now easily book movie tickets or
plan our travel with just a few clicks. Websites and apps like
BookMyShow, Expedia, and Kayak aggregate information from multiple
sources.

10. Social Impact - Social Impact and Activism are about how
people use the Internet to make a difference and improve society by
using viral content to spread messages and letting regular people
share news and opinions.
Examples: Online activism and awareness campaigns, Social
change through viral content, Online petitions

11. Converting Files - The Internet also offers various tools and
services for converting files from one format to another. Whether
converting a document from PDF to Word, an image from JPEG to PNG,
or a video from one format to another, online file conversion services
simplify the process.
12. Video Editing - In the past, professional video editing required
expensive equipment and specialized software. Now, with the help of
the Internet, many platforms offer user-friendly interfaces and a range
of editing features. Users can upload videos, trim clips, add transitions,
apply effects, and even incorporate music and text to create engaging
videos without investing in complex software or hardware.

______________
CYBERCRIMES AND INTERNET THREATS

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE

Cybercrime encompasses a wide range of criminal activities that are


carried out using digital devices and/or networks. These crimes involve the
use of technology to commit fraud, identity theft, data breaches, computer
viruses, scams, and expanded upon in other malicious acts. Cybercriminals
exploit vulnerabilities in computer systems and networks to gain
unauthorized access, steal sensitive information, disrupt services, and cause
financial or reputational harm to individuals, organizations, and
governments.

Classification of Cybercrimes
Computer crime encompasses a broad range of activities,
including computer fraud, financial crimes, scams, cybersex
trafficking, and ad-fraud.

a. Computer Fraud
Computer fraud is the act of using a computer to take or
alter electronic data, or to gain unlawful use of a computer or
system. Computer fraud that involves the use of the internet is
also called internet fraud. The legal definition of computer
fraud varies by jurisdiction, but typically involves accessing a
computer without permission or authorization.
Forms of computer fraud include hacking into computers to
alter information, distributing malicious code such as computer
worms or viruses, installing malware or spyware to steal
data, phishing, and advance-fee scams.

b. Cyberterrorism
The term cyberterrorism refers to acts
of terrorism committed through the use of cyberspace or
computer resources. Acts of disruption of computer networks and
personal computers through viruses, worms, phishing, malicious
software, hardware, or programming scripts can all be forms of
cyberterrorism.
Government officials and information technology (IT)
security specialists have documented a significant increase in
network problems and server scams since early 2001. In the
United States there is an increasing concern from agencies such
as the Federal Bureau of Investigation (FBI) and the Central
Intelligence Agency (CIA).

c. Cyberextortion
Cyberextortion occurs when a website, e-mail server, or
computer system is subjected to or threatened with attacks by

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
malicious hackers, often through denial-of-service attacks.
Cyberextortionists demand money in return for promising to stop
the attacks and provide "protection". According to the FBI,
cyberextortionists are increasingly attacking corporate websites
and networks, crippling their ability to operate, and demanding
payments to restore their service. An example of cyberextortion
was the Sony Hack of 2014.

d. Ransomware
Ransomware is a type of malware used in cyberextortion to
restrict access to files, sometimes threatening permanent data
erasure unless a ransom is paid. Ransomware is a global issue,
with more than 300 million attacks worldwide in 2021.

e. Cybersex Trafficking
Cybersex trafficking is the transportation of victims for
such purposes as coerced prostitution or the live streaming of
coerced sexual acts or rape on webcam. Victims are abducted,
threatened, or deceived and transferred to "cybersex dens".
The dens can be in any location where the cybersex traffickers
have a computer, tablet, or phone with an internet connection.
Perpetrators use social media networks, video conferences,
dating pages, online chat rooms, apps, dark web sites, and other
platforms. They use online payment systems
and cryptocurrencies to hide their identities. Millions of reports of
cybersex incidents are sent to authorities annually.

f. Cyberwarfare
According to the U.S. Department of Defense, cyberspace
has emerged as an arena for national-security threats through
several recent events of geostrategic importance, including the
attack on Estonia's infrastructure in 2007, allegedly by Russian
hackers. In August 2008, Russia again allegedly conducted
cyberattacks against Georgia. Fearing that such attacks may
become a normal part of future warfare among nation-states,
military commanders see a need to develop cyberspace
operations.

g. Obscene of Offensive Content


The content of websites and other electronic
communications may be distasteful, obscene, or offensive for a
variety of reasons. In some instances, it may be illegal. What
content is unlawful varies greatly between countries, and even
within nations. It is a sensitive area in which the courts can

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
become involved in arbitrating between groups with strong
beliefs. One area of internet pornography that has been the
target of the strongest efforts at curtailment is child
pornography, which is illegal in most jurisdictions in the world.

h. Ad-fraud
Ad-frauds are particularly popular among cybercriminals,
as such frauds are lucrative and unlikely to be prosecuted. Jean-
Loup Richet, a professor at the Sorbonne Business School,
classified the large variety of ad-frauds committed by
cybercriminals into three categories: identity fraud,
attribution fraud, and ad-fraud services.
 Identity fraud aims to impersonate real users and
inflate audience numbers.
 Attribution fraud impersonates the activities of real
users, such as clicks and conversations.
 Ad-fraud services include all online infrastructure and
hosting services that might be needed to undertake
identity or attribution fraud.

i. Online Harassment
Whereas content may be offensive in a non-specific
way, harassment directs obscenities and derogatory comments
at specific individuals, often focusing on gender, race, religion,
nationality, or sexual orientation.

j. Drug Trafficking
Darknet markets are used to buy and sell recreational
drugs online. Some drug traffickers use encrypted messaging
tools to communicate with drug mules or potential customers.
The dark web site Silk Road, which started operations in 2011,
was the first major online marketplace for drugs.
INTERNET THREATS
Cybersecurity is an ever-changing landscape and it can be difficult to
keep up with the latest cybersecurity threats. To help you stay ahead of
potential issues, we have put together a comprehensive list of all types of
Internet threats so you will know exactly what type of security measures
need to be taken to protect your organization’s data and systems. In this
article we will define internet security and define threats in cyber security
include the list of threats you may encounter online.

Internet threat is a threat that makes use of the World Wide Web to
disperse, conceal, and update itself to facilitate cybercrime. By simply using
the internet, we are constantly being bombarded by multiple types of

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
internet threats. All types of internet threats apply various forms of malware
and fraud, in which every part of it uses HTTP or HTTPS protocols, and
utilizes other protocols and components, such as links in email or instant
messaging, or malware attachments that have access to the Web.

CYBER THREATS CATEGORIES


Cybersecurity threats refer to any unauthorized access, exposure,
damage, or destruction of information systems, networks, and technologies.
These threats encompass a wide range of malicious activities such as
phishing, malware, viruses, and even ransomware attacks. They can come
from various sources like hackers, cybercriminals, insiders, or state-
sponsored actors, targeting both individuals and organizations. Many times,
unwanted software may also be unintentionally downloaded and cause
damage to systems.
1. MALWARE - Malware is a type of malicious software that is
designed to damage or disable computers and computer systems. It
can spread via email attachments, file-sharing networks, online
advertisements, and infected websites.
2. PHISHING - Phishing is a type of online fraud that involves tricks or
deception to get victims to reveal personal information such as
credit card numbers, passwords, and account numbers.
3. RANSOMWARE - Ransomware is a type of malware that can
encrypt or lock files on your computer and demand a ransom to
decrypt them. This type of ransomware attack can be devastating
for businesses, as it can result in the loss of important data or
systems being taken offline.
4. SOCIAL ENGINEERING - Social engineering is a type of attack that
relies on human interaction to trick victims into revealing
information or performing actions that they wouldn’t normally do.
These social engineering attacks can include anything from phony
phone calls and emails to fake websites and social media profiles.
COMMON TYPES OF INTERNET THREATS
1. ADWARE - Adware is any software application in which advertising
banners are displayed while a program is running. The ads are
delivered through pop-up windows or bars that appear on the
program’s user interface. Adware is commonly created for computers,
but may also be found on mobile devices.
2. BOTNETS - Botnets are compilations of any form of internet-connected
system that an attacker has compromised. A botnet is the compilation
of software robots, or ‘bots’, that generates an army of infected
computers (also regarded as ‘zombies’) that are distantly controlled by
the inventor. It acts as a power multiplier for cybercriminals to force an
entry into their recipient device. The bots are dispersed because the

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
attacker uses several computers, together with yours, to lift off the
distributed denial-of-service attacks (DDOS).
3. BROWSER HIJACKERS - This is a malware program that modifies web
browser settings without the user’s permission and redirects the user
to websites the user had not intended to visit. Often called a browser
redirect virus because it redirects the browser to other, usually
malicious, websites, a browser hijacker enables browser hijacking.
4. CYBER ATTACK - A cyber-attack is an intentional manipulation attack
against computer systems, networks, and internet-supported devices.
It makes use of malicious code to change the computer code, logic, or
data causing troublesome outcomes that can compromise data and
result in cybercrime such as information and identity damage. It is also
acknowledged as a computer network attack (CNA).
5. CYBERCRIME - Cybercrime is any criminal activity that requires a
computer, networked gadget, or a network. While most cybercrimes
are incorporated online scams with the intention of generating profit
for the cybercriminals, some cybercrimes are carried out against
computers or devices openly to damage or deactivate them, while
others use it to distribute malware, illicit information, images, or other
materials.
6. MALWARE - Malware is any program that is detrimental to a computer
user. Malware consists of computer viruses, spyware, worms, and
Trojan horses. These malicious programs can execute a selection of
functions, ranging from stealing, encoding, or other data breaches
deleting delicate data, modifying or hijacking essential computing
tasks, and monitoring users’ computer actions without their consent.
7. OVERSEAS MONEY TRANSFER SCAM - This type of scam is
specifically tricky where the scammer sends you money under the
guise of payment. Once a device is compromised, hackers have access
to everything on it: contacts, emails, passwords, photos, and any other
sensitive information. To make matters worse, they can also leave
victims with costly bills.
8. SPAM - This is the mass distribution of unwanted messages,
advertising, or pornography to individuals which can simply be found
on the Internet such as social networking sites, company websites, and
personal blogs.
9. SPYWARE - Spyware is software that is installed on a computing
device without the end user’s knowledge.
10. SCAREWARE - Scareware is a type of malware designed to trick
victims into purchasing and downloading useless and potentially
dangerous software. Scareware, which generates pop-ups that
resemble Windows system messages, usually purports to
be antivirus or antispyware software, a firewall application, or a
registry cleaner. The messages typically say that a large number of

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE
problems — such as infected files — have been found on the computer
and the user is prompted to purchase software to fix the problems.
11. VIRUSES – A computer virus is a malicious code that replicates
by copying itself to another program, computer boot sector, or
document and changes how a computer works. The virus requires
someone to knowingly or unknowingly spread the infection without the
knowledge or permission of a user or system administrator.
12. WORMS - A computer worm is a type of malicious software
program whose primary function is to infect other computers while
remaining active on infected systems. A computer worm is a malicious,
self-replicating software program (popularly termed ‘malware’) that
affects the functions of software and hardware programs.

Course Code: GEElect 101


Descriptive Title: Living in the IT Era Instructor: JOHN PAUL G. GONZAGA

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy