Internet-Threat-edited
Internet-Threat-edited
E M P OW E R M E N T T E C H N O L O G I E S
1. MALWARE
• short for malicious software
• is an umbrella term used to refer to a
variety of forms of hostile or intrusive
software, including computer viruses,
worms, trojan horses, ransomware,
spyware, adware, scareware, and
other malicious programs
EXAMPLES OF MALICIOUS SOFTWARE
A.Virus
A malicious program designed to
replicate itself and transfer from
one computer to another either
through the internet and local
networks or data storage like
flash drives and CDs
EXAMPLES OF MALICIOUS SOFTWARE
B.Worm
A malicious program that
transfers from one computer to
another by any type of means.
Often, it uses a computer
network to spread itself. Ex.
(Love Bug Worm) created by
Filipino.
C. TROJAN
A malicious program that that is
disguised as a useful program but
once downloaded or installed, leaves
your PC unprotected and allows
hackers to get your information.
Rogue Security Software – tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his security but in
reality they are not protected at all.
D. SPYWARE
A program that runs in the
background without you knowing it
(thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.
Keyloggers – used to record the
keystroke done by the users. This is
done to steal password or any
sensitive information. It can record
email, messages or any information
you type using your keyboard.
E. ADWARE
A program
designed to send
you advertisements,
mostly as popups.
2. SPAM
• Unwanted email mostly
from bots or advertisers.
It can be used to send
malware.
CYBERCRIMES
1. PHISHING
• Its goal is to acquire sensitive
personal information like passwords
and credit card details.
• This is done by sending you and
email that will direct the user to a
website and be asked to update
his/her username, password, credit
card or personal information.
2. PHARMING
• It is a more complicated
way of phishing where it
exploits the DNS
(Domain Name System)
system.
3. HACKING
• it is unauthorized accessing of
data from a computer network.
Mostly, hackers attack commercial
and government sites to cause an
alarm or to threat someone.
4. SPORT BETTING
•it is an illegal act of
gambling on any sports
event that happened over
the Internet.
5. NON-DELIVERY OF
MERCHANDISE
• a deceiving act which the culprit posted
a product or service on the Internet.
Once the victim placed its payment, the
culprit does not give the item or
service.
5. ELECTRONIC
HARASSMENT
• an anonymous criminal who harass, abuse,
threat, or annoy other people. One
example of this is cyberbullying or the
repeated harassment that usually happens
among the youth, and from the past years,
becomes the main cause of suicide cases.
5. CHILD PORNOGRAPHY
• Based on Republic Act no 9775 or known as
Anti- Child Pornography Act of 2009, it is an
act of real or simulated explicit sexual
activities that involves any child aged 18 and
below and it is penalized depending on the
offender. If it is the parent or relative of the
child, they’ll receive the maximum penalty.
5. PROSTITUTION
•it is an illegal act engage in
any sexual activities
5. COPYRIGHT
INFRINGEMENT
• it is an unauthorized use or stealing
of intellectual property, such as
movies and music, for profitable
benefit.
• Sometimes, students violate it
through plagiarism.
CO M MON T H R E AT S
TO B E AWA R E O F
BOTNETS
• A collection of software robots, or 'bots', that creates an
army of infected computers (known as ‘zombies') that are
remotely controlled by the originator. Yours may be one
of them and you may not even know it.
What they can do:
Send spam emails with viruses attached.
Spread all types of malware.
Can use your computer as part of a denial of service attack
against other systems.
DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACK
What it is:
• The mass distribution of unsolicited messages,
advertising or pornography to addresses which can be
easily found on the Internet through things like social
networking sites, company websites and personal
blogs.
WI-FI EAVESDROPPING
• WiFi eavesdropping is another method used by cyber
criminals to capture personal information.
What it is:
• Virtual “listening in” on information that's shared over an unsecure
(not encrypted) WiFi network.
What it can do:
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and passwords.