This document discusses various internet threats such as malware, spam, and phishing. It defines different types of malware like viruses, worms, trojans, spyware and adware. Viruses and worms are malicious programs that replicate and spread from one computer to another. Trojans pose as useful programs but leave computers unprotected. Spyware and keyloggers monitor users' activities without their knowledge. Spam refers to unwanted emails, while phishing tricks users into sharing private information on fake websites. It also provides tips to avoid copyright infringement and conduct safe online research.
4. a. Virus
Malicious program designed to replicate
itself & transfer from one computer to
another either through the internet & local
networks or data storage like flash drives
and CD’s.
5.
6. b. Worm
A malicious program designed that
transfers from one computer to another by
any type of means, Often, it uses a
computer network to spread itself.
7. b. Worm
Onel de Guzman
The creator of one of the most
popular worm: ILOVEYOU
worm. (“Love bug worm”)
8. c. Trojan
A malicious program disguised as a
useful program but once downloaded or
installed, leaves your PC unprotected &
allows hackers to get information.
9.
10. c. Trojan
ROGUE SECURITY SOFTWARE
tricks the user into posing that it is a
security software. But in reality they are
not protected at all.
11. d. Spyware
Program that runs in the background
without you knowing it ( thus called
“spy”)
Has the ability to monitor what you are
currently doing through keylogging.
12. d. Spyware
Keyloggers
- used to record the keystroke done by
the user.
-done to steal password or any other
sensitive information
-can record email, messages, any info.
15. 3. PHISHING
It’s goal is to acquire sensitive
personal information like
password & credit card details.
16. 3. PHISHING
Done by sending you email that
will direct the user to visit a website
& be asked to update his/her
username, password, credit card
details or personal information.
17. *Pharming
A more complicated way of phishing
where it exploits DNS (Domain Name
Service)
26. Name of the Person or organization (the author of the information). Title of the
home page in italics (title is shown in the title bar but is sometimes missing or
unrelated). URL. Date last seen.
Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”
http://oleander.penz.com/random/bananalove.htm. Viewed on September 7,
2015
Proper Citation