EmTech PPT Lesson 2 2.2
EmTech PPT Lesson 2 2.2
Technology
Quarter 3-week 2
Lesson 2.2: Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the
World Wide Web evolved over the years, many internet
predators have been playing on vulnerabilities to attack
computers and retrieve sensitive data from individuals. Half the
time, we aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to
gain access to a computer network without authorization or
permission from the owners. These are usually done by
computer hackers who uses the World Wide Web to facilitate
cybercrime.
Web threats use multiple types of malware and fraud, all of
which utilize HTTP or HTTPS protocols, but may also employ
other protocols and components, such as links in email or
Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by
stealing information for subsequent sale and help absorb
infected PCs into botnets. Web threats pose a broad range of
risks, including financial damages, identity theft, loss of
confidential information/data, theft of network resources,
damaged brand/personal reputation, and erosion of consumer
confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be
aware of:
1. Phishing happens when an email is sent from an internet criminal
disguised as an email from a legitimate, trustworthy source. The
message is meant to lure you into revealing sensitive or confidential
information.
**Pharming happens when a hacker
(or “pharmer”) directs an internet
user to a fake website instead of a
legitimate one. These “spoofed” sites
can capture a victim’s confidential
information, including usernames,
passwords, and credit card data, or
install malware on their computer.
Pharmers usually focus on websites
in the financial sector, including
banks, online payment platforms, or
other e-commerce destinations
2. Malware or malicious software, is any program or file
that is harmful to a computer user. Here are the most
common offenders in the rogues’ gallery of malware