0% found this document useful (0 votes)
10 views17 pages

Computer Threats

The document discusses various internet services and computer threats. It describes video conferencing, email, cyberthreats, phishing, spam including different types of spam, and malware including viruses, worms, Trojan horses, spyware, and logic bombs. It also discusses eavesdropping, identity theft, and credit card fraud.

Uploaded by

nseaton
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views17 pages

Computer Threats

The document discusses various internet services and computer threats. It describes video conferencing, email, cyberthreats, phishing, spam including different types of spam, and malware including viruses, worms, Trojan horses, spyware, and logic bombs. It also discusses eavesdropping, identity theft, and credit card fraud.

Uploaded by

nseaton
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Internet Services in an organizations

department

third Form
Internet services used in an organization

✔ Video Conferencing: This is a method of


communicating simultaneously using video and audio
transmission.

✔ Email: This is communication tool that is used to send


electronic messages over the internet.
COMPUTER THREATS
Threats to a computer network

✔ Cyberthreats are potentials for vulnerabilities to turn


into attacks on computer systems, networks, and more.

✔ Cyberthreats can include everything from viruses,


trojans, back doors to outright attacks from hackers.
Examples Computer of threats

1. Phishing: Is the act 2. Spam: Also called


of obtaining sensitive junk email is the use of
information (passwords electronic messaging
and username) by system to send bulk
disguising as a messages that were
trustworthy source. not requested.
Types of Spam:

✔ Returned Mail Spam:


When you send an email to a non-existent or inactive
address, you will usually receive a delivery fail receipt in
your inbox. However, if you get a delivery fail receipt for a
message you don’t remember ever sending, it is very
likely a fake message. Spammers may also attach a
malicious file and try to trick you into opening it by
claiming that it contains your original message.
✔ Fake Response Spam:
Fake response spam messages use the “Re:” prefix in
the subject line to make you believe that you’re receiving
a response to an email you may have sent earlier. As
soon as you open it, however, you will see a message
that has nothing to do with the subject line. Instead, it will
usually contain some poorly written promotional offer with
calls to action and links that might take you to malicious
websites.
✔Social Media Spam
If you subscribe to email notifications from social media platforms,
you may have been tricked by social media spam in the past.
Formatted just like the real thing, these emails inform you about
new messages, likes, and comments on your social media profile.

These messages will also include a link that takes you to a fake
login page designed to steal login data from unsuspecting victims.
Computer threats
continue
•3. Malware:
•Short for "malicious
software," malware refers
to software programs
designed to damage or do
other unwanted actions on
a computer system.
✔ Virus: Computer viruses are small programs
or scripts that can negatively affect the health
of your computer. These malicious little
programs can create files, move files, erase
files, consume your computer's memory, and
cause your computer not to function
correctly.
Types of
malware ✔ Worm: Computer worms tunnel through your
computer's memory and hard drive. A
computer worm is a type of virus that
replicates itself, but does not alter any files
on your machine. If a worm consumes your
memory, your computer will run very slowly
and possibly even crash.
✔ Trojan horses:Trojan horses are
software programs that
masquerade as regular programs,
such as games, disk utilities, and
Types of even antivirus programs.or
malware example, a Trojan horse might
continue appear to be a computer game, but
once you double-click it, the
program starts writing over certain
parts of your hard drive, corrupting
your data.
Types of Malware continue

✔ Spyware: Is a program that uses internet connection to


send personal information from your computer to
another without your knowledge. he best way to detect
this type of software is to have an up-to-date firewall,
anti-malware, or antivirus software installed on your
device. These will alert you in case there is any
suspicious activity or any other kinds of security threats
on your PC.
Types of spyware

Keyloggers – Also known as system monitors, keyloggers are


designed to record your computer’s activity, including
keystrokes, search history, email activity, chat room
communications, websites accessed, system credentials, etc.

Password Stealers – These types of spyware will collect any


passwords inserted into an infected device. These may
include things like system login credentials or other such
critical passwords.
Infostealers – When a PC or other device is infected
with this type of spyware, it can provide third parties
with sensitive information such as passwords,
usernames, email addresses etc.

Banking Trojans – Like info stealers, banking trojans


take advantage of browser security vulnerabilities to
acquire credentials from financial institutions, modify
transaction content or web pages, or insert additional
transactions, among other things.
✔ Logic bomb: Are pieces of code (usually malicious)
inserted into a program that will set off a function if
certain conditions (such as a behavior or a specific
date/time) are met. Such functions could restrict access
to or delete files.
4. Eavesdropping: Listening into
conversation. Packet sniffers are often
used to accomplish this network.

Computer 5. Identity theft: Identity theft is the


threats unauthorized collection of personal
information and its subsequent use for
continued
criminal reasons such as to open credit
cards and bank accounts, redirect mail,
set up cellphone service, rent vehicles
and even get a job.
Computer threats continue

6. Credit Card Fraud:Criminals have been able to use


technology, with relative ease, to produce fraudulent
versions of existing credit cards. The Internet helped this
scheme to grow. Some criminals sell the magnetic strips
found on many cards or the technology to duplicate the
information from a valid credit card. These magnetic
strips contain all the information a fraudster needs:
names, account numbers, credit limits, plus other
identifying information

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy