SlideShare a Scribd company logo
1 of 26
INTERNET THREATS
1.
MALWARE
3.
PHISHING
2. SPAM
a. Virus
b. Worm
c. Trojan
d. Spyware
e. Adware
*Pharming
1.
MALWARE
 MALicious
softWARE.
a. Virus
 Malicious program designed to replicate
itself & transfer from one computer to
another either through the internet & local
networks or data storage like flash drives
and CD’s.
b. Worm
 A malicious program designed that
transfers from one computer to another by
any type of means, Often, it uses a
computer network to spread itself.
b. Worm
Onel de Guzman
The creator of one of the most
popular worm: ILOVEYOU
worm. (“Love bug worm”)
c. Trojan
 A malicious program disguised as a
useful program but once downloaded or
installed, leaves your PC unprotected &
allows hackers to get information.
c. Trojan
 ROGUE SECURITY SOFTWARE
tricks the user into posing that it is a
security software. But in reality they are
not protected at all.
d. Spyware
 Program that runs in the background
without you knowing it ( thus called
“spy”)
 Has the ability to monitor what you are
currently doing through keylogging.
d. Spyware
 Keyloggers
- used to record the keystroke done by
the user.
-done to steal password or any other
sensitive information
-can record email, messages, any info.
e. Adware
 Program designed to send you
advertisements, mostly as pop ups.
2. SPAM
 Unwanted email
mostly from bots or
advertisers.
3. PHISHING
 It’s goal is to acquire sensitive
personal information like
password & credit card details.
3. PHISHING
 Done by sending you email that
will direct the user to visit a website
& be asked to update his/her
username, password, credit card
details or personal information.
*Pharming
 A more complicated way of phishing
where it exploits DNS (Domain Name
Service)
THINK BEFORE
YOU CLICK!
COPYRIGHT
INFRINGEMENT
- As a responsible user of the
internet, you have to consider
that not everything out there is
free for you to use.
TIPS TO AVOID
COPYRIGHT
INFRINGEMENT
1. Understand
2. Be
responsible
3. Be Creative
4. Know the
Law
Fair use logo
TIPS IN
CONDUCTING
RESEARCH
ONLINE
1. Have a
question in mind
2. Narrow it
down
3. Advanced
Search
4. Look for
credible sources
5. Give Credit
Name of the Person or organization (the author of the information). Title of the
home page in italics (title is shown in the title bar but is sometimes missing or
unrelated). URL. Date last seen.
Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”
http://oleander.penz.com/random/bananalove.htm. Viewed on September 7,
2015
Proper Citation

More Related Content

What's hot

What's hot (20)

Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment Technologies
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Empowerment Technology Lesson 5
Empowerment Technology Lesson 5Empowerment Technology Lesson 5
Empowerment Technology Lesson 5
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
Emp Tech 1 introduction
Emp Tech 1 introductionEmp Tech 1 introduction
Emp Tech 1 introduction
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 

Similar to [EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS

Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

Similar to [EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
What is malware
What is malwareWhat is malware
What is malware
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threat
Internet ThreatInternet Threat
Internet Threat
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 

More from JazzyNF

More from JazzyNF (15)

[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
[EMPOWERMENT TECHNOLOGIES]-IMAGING AND DESIGN FOR ONLINE ENVIRONMENT
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
 
TLE 6-Common cattle breeds in asia, america and europe
TLE 6-Common cattle breeds in asia, america and europeTLE 6-Common cattle breeds in asia, america and europe
TLE 6-Common cattle breeds in asia, america and europe
 
MAPEH-ARTS-CLASSICAL ARTS AND MUSIC
MAPEH-ARTS-CLASSICAL ARTS AND MUSICMAPEH-ARTS-CLASSICAL ARTS AND MUSIC
MAPEH-ARTS-CLASSICAL ARTS AND MUSIC
 
MAPEH-PH-VOLLEYBALL
MAPEH-PH-VOLLEYBALLMAPEH-PH-VOLLEYBALL
MAPEH-PH-VOLLEYBALL
 
MAPEH-MUSIC-VISAYAN MUSIC
MAPEH-MUSIC-VISAYAN MUSICMAPEH-MUSIC-VISAYAN MUSIC
MAPEH-MUSIC-VISAYAN MUSIC
 
MAPEH-PH-OUTDOOR RECREATIONS
MAPEH-PH-OUTDOOR RECREATIONSMAPEH-PH-OUTDOOR RECREATIONS
MAPEH-PH-OUTDOOR RECREATIONS
 
MAPEH-HEALTH-CLASSIFICATION OF DRUGS
MAPEH-HEALTH-CLASSIFICATION OF DRUGSMAPEH-HEALTH-CLASSIFICATION OF DRUGS
MAPEH-HEALTH-CLASSIFICATION OF DRUGS
 
MAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
MAPEH-MUSIC-TRADITIONAL CHINESE MUSICMAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
MAPEH-MUSIC-TRADITIONAL CHINESE MUSIC
 
MAPEH-PH-HEALTH RELATED COMPONENTS
MAPEH-PH-HEALTH RELATED COMPONENTSMAPEH-PH-HEALTH RELATED COMPONENTS
MAPEH-PH-HEALTH RELATED COMPONENTS
 
MAPEH-HEALTH-HOLISTIC HEALTH
MAPEH-HEALTH-HOLISTIC HEALTHMAPEH-HEALTH-HOLISTIC HEALTH
MAPEH-HEALTH-HOLISTIC HEALTH
 
MAPEH-HEALTH-SEXUALITY EDUCATION
MAPEH-HEALTH-SEXUALITY EDUCATIONMAPEH-HEALTH-SEXUALITY EDUCATION
MAPEH-HEALTH-SEXUALITY EDUCATION
 
MAPEH-PH-SKILL RELATED FITNESS COMPONENTS
MAPEH-PH-SKILL RELATED FITNESS COMPONENTSMAPEH-PH-SKILL RELATED FITNESS COMPONENTS
MAPEH-PH-SKILL RELATED FITNESS COMPONENTS
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS

  • 1. INTERNET THREATS 1. MALWARE 3. PHISHING 2. SPAM a. Virus b. Worm c. Trojan d. Spyware e. Adware *Pharming
  • 3.
  • 4. a. Virus  Malicious program designed to replicate itself & transfer from one computer to another either through the internet & local networks or data storage like flash drives and CD’s.
  • 5.
  • 6. b. Worm  A malicious program designed that transfers from one computer to another by any type of means, Often, it uses a computer network to spread itself.
  • 7. b. Worm Onel de Guzman The creator of one of the most popular worm: ILOVEYOU worm. (“Love bug worm”)
  • 8. c. Trojan  A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected & allows hackers to get information.
  • 9.
  • 10. c. Trojan  ROGUE SECURITY SOFTWARE tricks the user into posing that it is a security software. But in reality they are not protected at all.
  • 11. d. Spyware  Program that runs in the background without you knowing it ( thus called “spy”)  Has the ability to monitor what you are currently doing through keylogging.
  • 12. d. Spyware  Keyloggers - used to record the keystroke done by the user. -done to steal password or any other sensitive information -can record email, messages, any info.
  • 13. e. Adware  Program designed to send you advertisements, mostly as pop ups.
  • 14. 2. SPAM  Unwanted email mostly from bots or advertisers.
  • 15. 3. PHISHING  It’s goal is to acquire sensitive personal information like password & credit card details.
  • 16. 3. PHISHING  Done by sending you email that will direct the user to visit a website & be asked to update his/her username, password, credit card details or personal information.
  • 17. *Pharming  A more complicated way of phishing where it exploits DNS (Domain Name Service)
  • 20. - As a responsible user of the internet, you have to consider that not everything out there is free for you to use.
  • 21. TIPS TO AVOID COPYRIGHT INFRINGEMENT 1. Understand 2. Be responsible 3. Be Creative 4. Know the Law
  • 23.
  • 24. TIPS IN CONDUCTING RESEARCH ONLINE 1. Have a question in mind 2. Narrow it down 3. Advanced Search 4. Look for credible sources 5. Give Credit
  • 25.
  • 26. Name of the Person or organization (the author of the information). Title of the home page in italics (title is shown in the title bar but is sometimes missing or unrelated). URL. Date last seen. Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.” http://oleander.penz.com/random/bananalove.htm. Viewed on September 7, 2015 Proper Citation