0% found this document useful (0 votes)
11 views26 pages

Internet-Threat-edited

The document outlines various forms of internet threats, including malware, phishing, hacking, and spam, detailing their definitions and examples. It highlights the dangers of malicious software like viruses, worms, and ransomware, as well as cybercrimes such as identity theft and child pornography. Additionally, it discusses common threats like botnets and Wi-Fi eavesdropping, emphasizing the need for awareness and protection against these online dangers.

Uploaded by

imahandsomeman69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views26 pages

Internet-Threat-edited

The document outlines various forms of internet threats, including malware, phishing, hacking, and spam, detailing their definitions and examples. It highlights the dangers of malicious software like viruses, worms, and ransomware, as well as cybercrimes such as identity theft and child pornography. Additionally, it discusses common threats like botnets and Wi-Fi eavesdropping, emphasizing the need for awareness and protection against these online dangers.

Uploaded by

imahandsomeman69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

INTERNET THREAT

E M P OW E R M E N T T E C H N O L O G I E S
1. MALWARE
• short for malicious software
• is an umbrella term used to refer to a
variety of forms of hostile or intrusive
software, including computer viruses,
worms, trojan horses, ransomware,
spyware, adware, scareware, and
other malicious programs
EXAMPLES OF MALICIOUS SOFTWARE
A.Virus
A malicious program designed to
replicate itself and transfer from
one computer to another either
through the internet and local
networks or data storage like
flash drives and CDs
EXAMPLES OF MALICIOUS SOFTWARE
B.Worm
A malicious program that
transfers from one computer to
another by any type of means.
Often, it uses a computer
network to spread itself. Ex.
(Love Bug Worm) created by
Filipino.
C. TROJAN
A malicious program that that is
disguised as a useful program but
once downloaded or installed, leaves
your PC unprotected and allows
hackers to get your information.
Rogue Security Software – tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his security but in
reality they are not protected at all.
D. SPYWARE
A program that runs in the
background without you knowing it
(thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.
Keyloggers – used to record the
keystroke done by the users. This is
done to steal password or any
sensitive information. It can record
email, messages or any information
you type using your keyboard.
E. ADWARE
A program
designed to send
you advertisements,
mostly as popups.
2. SPAM
• Unwanted email mostly
from bots or advertisers.
It can be used to send
malware.
CYBERCRIMES
1. PHISHING
• Its goal is to acquire sensitive
personal information like passwords
and credit card details.
• This is done by sending you and
email that will direct the user to a
website and be asked to update
his/her username, password, credit
card or personal information.
2. PHARMING
• It is a more complicated
way of phishing where it
exploits the DNS
(Domain Name System)
system.
3. HACKING
• it is unauthorized accessing of
data from a computer network.
Mostly, hackers attack commercial
and government sites to cause an
alarm or to threat someone.
4. SPORT BETTING
•it is an illegal act of
gambling on any sports
event that happened over
the Internet.
5. NON-DELIVERY OF
MERCHANDISE
• a deceiving act which the culprit posted
a product or service on the Internet.
Once the victim placed its payment, the
culprit does not give the item or
service.
5. ELECTRONIC
HARASSMENT
• an anonymous criminal who harass, abuse,
threat, or annoy other people. One
example of this is cyberbullying or the
repeated harassment that usually happens
among the youth, and from the past years,
becomes the main cause of suicide cases.
5. CHILD PORNOGRAPHY
• Based on Republic Act no 9775 or known as
Anti- Child Pornography Act of 2009, it is an
act of real or simulated explicit sexual
activities that involves any child aged 18 and
below and it is penalized depending on the
offender. If it is the parent or relative of the
child, they’ll receive the maximum penalty.
5. PROSTITUTION
•it is an illegal act engage in
any sexual activities
5. COPYRIGHT
INFRINGEMENT
• it is an unauthorized use or stealing
of intellectual property, such as
movies and music, for profitable
benefit.
• Sometimes, students violate it
through plagiarism.
CO M MON T H R E AT S
TO B E AWA R E O F
BOTNETS
• A collection of software robots, or 'bots', that creates an
army of infected computers (known as ‘zombies') that are
remotely controlled by the originator. Yours may be one
of them and you may not even know it.
What they can do:
Send spam emails with viruses attached.
Spread all types of malware.
Can use your computer as part of a denial of service attack
against other systems.
DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACK

• A distributed denial-of-service (DDoS) attack — or DDoS


attack — is when a malicious user gets a network of
zombie computers to sabotage a specific website or server.
The attack happens when the malicious user tells all the
zombie computers to contact a specific website or server
over and over again. That increase in the volume of traffic
overloads the website or server causing it to be slow for
legitimate users, sometimes to the point that the website
or server shuts down completely.
HACKING
It is a term used to describe actions taken by someone to gain unauthorized
access to a computer. The availability of information online on the tools,
techniques, and malware makes it easier for even non-technical people to
undertake malicious activities.
• What it is:
• The process by which cyber criminals gain access to your computer.
• What it can do:
• Find weaknesses (or pre-existing bugs) in your security settings and exploit
them in order to access your information.
• Install a Trojan horse, providing a back door for hackers to enter and
search for your information.
RANSOMWARE
• Ransomware is a type of malware that restricts
access to your computer or your files and
displays a message that demands payment in
order for the restriction to be removed. The
two most common means of infection appear
to be phishing emails that contain malicious
attachments and website pop-up
advertisements.
RANSOMWARE
There are two common types of ransomware:
• Lock screen ransomware: displays an image that prevents you
from accessing your computer
• Encryption ransomware: encrypts files on your system's hard
drive and sometimes on shared network drives, USB drives, external
hard drives, and even some cloud storage drives, preventing you
from opening them
• Ransomware will display a notification stating that your computer or
data have been locked and demanding a payment be made for you to
regain access. Sometimes the notification states that authorities
have detected illegal activity on your computer, and that the payment
is a fine to avoid prosecution.
SPAM
• Spam is one of the more common methods of both
sending information out and collecting it from
unsuspecting people.

What it is:
• The mass distribution of unsolicited messages,
advertising or pornography to addresses which can be
easily found on the Internet through things like social
networking sites, company websites and personal
blogs.
WI-FI EAVESDROPPING
• WiFi eavesdropping is another method used by cyber
criminals to capture personal information.
What it is:
• Virtual “listening in” on information that's shared over an unsecure
(not encrypted) WiFi network.
What it can do:
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and passwords.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy