0% found this document useful (0 votes)
40 views11 pages

GERNALE - PPTX 20241001 131920 0000

Hhhh

Uploaded by

gernalehanes86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views11 pages

GERNALE - PPTX 20241001 131920 0000

Hhhh

Uploaded by

gernalehanes86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

NAVIGATING THE DIGITAL

MINEFIELD:
UNDERSTANDIN
G INTERNET
THREATS
HACKING
Hacking refers to unauthorized access to a computer.
Information online makes it easier for non-experts to engage in
malicious activities. Cyber criminals use this process to access
computers.
What IT
• Find weaknesses (orcan do: bugs)
pre-existing in your security
settings and exploit them in order to
access your information.
• Install a Trojan horse, providing a back door for hackers to
enter and search for your
information
MALWARE
Malware is one of the more common ways to infiltrate or damage your
computer.

Malicious software that infects your computer, such as computer viruses,


worms, WHAT IT
horses, spyware, andCAN
adware. DO:
• Intimidate you with scareware, which is usually a pop-up message that tells
Trojan
you your
computer has a security problem or other false information.
• Reformat the hard drive of your computer causing you to lose all your
information.
• Alter or delete files.
• Steal sensitive information.
• Send emails on your behalf.
• Take control of your computer and all the software running on it.
PHARMING
Pharming is a common type of online fraud.

A means to point you to a malicious and illegitimate website by


redirecting the legitimate URL. Even if the URL is entered correctly, it
can still be redirected to a fake website.

WHAT IT
Convince you that the site is real and legitimate by spoofing or looking
almost identical to the actualCAN DO:
site down to the smallest details. You may
enter your personal information and unknowingly give it to someone
with malicious intent.
SPAM
Spam is one of the more common methods of both sending
information out and collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the Internet
through things like social networking sites, company websites and
personal blogs.
WHAT IT
• Annoy you with unwanted junk mail.
CAN
• Create a burden for communications DO:
service providers and businesses to filter
electranic
messages.
• Phish for your information by tricking you into following links or entering details
with too-good- to-be-true offers and promotions.
• Provide a vehicle for malware, scams, fraud and threats to your privacy.
PHISHING
Phishing is used most often by cyber criminals because it's easy to
execute and can produce the results they're looking for with very little
effort. Fake emails, text messages and websites created to look like
they're from authentic companies. They're sent by criminals to steal
personal and financial information from you. This is also known as
"spoofing". WHAT IT
• Trick you into giving them information by asking you to update, validate or
CAN DO:
confirm your account. It is often presented in a manner than seems official and
intimidating, to encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can
access your accounts (your online bank account, shopping accounts, etc.) and
steal your credit card numbers.
SPYWARE
( SPYWARE &
ADWARE )
Spyware and adware are often used by third parties to infiltrate your
computer.

What it is:
• Software that collects personal information about you without you
knowing. They often come in the form of a 'free' downioad and are
installed automatically with or without your consent. These are difficult
WHAT IT
to remove and can infect your computer with viruses.
• Collect information about you without you knowing about it and give it to third
parties.
CAN DO:
• Send your usernames, passwords, surfing habits, list of applications you've
downloaded,
• settings, and even the version of your operating system to third parties.
Change the way your computer runs without your knowledge.
• Take you to unwanted sites or inundate you with uncontrollable pop-up ads.
RANSOMWARE
Ransomware is a type of malware that locks and encrypts a victim's
data, files, devices or systems, rendering them inaccessible and
unusable until the attacker receives a ransom payment.

WHAT IT
CAN DO:
• There are two common types of ransomware:
• Lockscreen ransomware: displays an image that prevents you from accessing your computer
• Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared
network drives, USB drives, external hard drives, and even some cloud storage drives,
preventing you from opening them
• Ransomware will display a notification stating that your computer or data have been locked
and demanding a payment be made for you to regain access. Sometimes the notification states
that authorities have detected illegal activity on your computer, and that the payment is a fine
to avoid prosecution.
WORMS
worm virus exploits vulnerabilities in your security software to steal
sensitive information, install backdoors that can be used to access the
system, corrupt files, and do other kinds of harm.

WHAT IT
CAN DO:
• Spread to everyone in your contact list.
• Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking
havoc on an internal network and costing companies' enormous amounts of lost revenue.
CONCLUSION
In conclusion, "Navigating the Digital Minefield:
Understanding Internet Threats" highlights the importance
of awareness and education in protecting ourselves online.
By understanding the various threats, such as phishing,
malware, and data breaches, individuals can take proactive
measures to safeguard their personal information and
maintain a secure online presence. Staying informed and
adopting best practices is essential in today’s digital
landscape.
THANK
YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy