0% found this document useful (0 votes)
15 views1 page

Safe Internet Use

Uploaded by

thimnasethum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views1 page

Safe Internet Use

Uploaded by

thimnasethum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Safe internet use

The following terms are related to safe internet use:

Anti-virus software
Anti-virus software is a computer program that scans Phishing
computer files for viruses and eliminates them. Phishing refers to attempts from people to con the
Computer virus user into giving out personal, confidential details such
as PIN numbers and passwords, etc. by posing as a
A computer virus is a program that is written to
legitimate organisation, usually via e-mail.
disrupt the normal functioning of a person’s computer
without their knowledge or consent. Secure URL
Computer worm A secure URL begins with https:// or has a small closed
lock displayed somewhere on the page, often next to
A computer worm is malware that is able to distribute
the URL.
itself over a network, normally via e-mail, without a
person having run an infected program. Spam
E-mail spoofing Spam is the electronic equivalent of ‘junk mail’. It is an
e-mail sent to you in the form of advertising products
E-mail spoofing is the forgery of an e-mail header so
that you did not request.
that the source of the e-mail appears to be from a
different origin. Trojan
Internet hoax A Trojan is a destructive program disguised as a useful
application.
An internet hoax is an e-mail message or article
intended to deceive or defraud others. Virus signature (definition)
Pharming A virus signature or definition is the pattern that
uniquely identifies a virus.
Pharming is an identity theft scam where a criminal
‘hijacks’ a legitimate website or server in order to get
people’s personal details to steal their money.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy