0% found this document useful (0 votes)
351 views14 pages

Lesson 10 Internet Threats

that explain how ICT units helps us in the future

Uploaded by

gellazo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
351 views14 pages

Lesson 10 Internet Threats

that explain how ICT units helps us in the future

Uploaded by

gellazo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

LESSON 10:

INTERNET THREATS

1
HACKING
Hacking is a term used to describe actions
taken by someone to gain unauthorized access
to a computer. The availability of information
online on the tools, techniques, and malware
makes it easier for even non-technical people
to undertake malicious activities.

The process by which cyber criminals gain


access to your computer.

2
MALWARE
Malware is one of the more common ways
to infiltrate or damage your computer.
Malicious software that infects your
computer, such as computer viruses, worms,
Trojan horses, spyware, and adware.

3
PHARMING
Pharming is a common type of online fraud.

A means to point you to a malicious and


illegitimate website by redirecting the
legitimate URL. Even if the URL is entered
correctly, it can still be redirected to a fake
website.

4
PHISHING
Phishing is used most often by cyber criminals
because it's easy to execute and can produce
the results they're looking for with very little
effort. Fake emails, text messages and websites
created to look like they're from authentic
companies. They're sent by criminals to steal
personal and financial information from you.
This is also known as “spoofing”.

5
RANSOMWARE
Ransomware is a type of malware that restricts
access to your computer or your files and
displays a message that demands payment in
order for the restriction to be removed. The two
most common means of infection appear to be
phishing emails that contain malicious
attachments and website pop-up
advertisements.

6
COMMON TYPES OF RANSOMWARE
• Lockscreen ransomware: displays an image
that prevents you from accessing your computer.

• Encryption ransomware: encrypts files on


your system's hard drive and sometimes on
shared network drives, USB drives, external
hard drives, and even some cloud storage drives,
preventing you from opening them.

7
SPAM
Spam is one of the more common methods of
both sending information out and collecting it
from unsuspecting people. The mass
distribution of unsolicited messages, advertising
or pornography to addresses which can be easily
found on the Internet through things like social
networking sites, company websites and
personal blogs.

8
SPYWARE (SPYWARE & ADWARE)
Spyware and adware are often used by third
parties to infiltrate your computer.

It is a software that collects personal


information about you without you knowing.
They often come in the form of a ‘free'
download and are installed automatically with
or without your consent. These are difficult to
remove and can infect your computer

9
TROJAN HORSES
A Trojan horse may not be a term you're
familiar with, but there's a good chance you or
someone you know has been affected by one. A
malicious program that is disguised as, or
embedded within, legitimate software. It is an
executable file that will install itself and run
automatically once it’s downloaded.

10
VIRUSES
Most people have heard of computer viruses,
but not many know exactly what they are or
what they do. Malicious computer programs
that are often sent as an email attachment or a
download with the intent of infecting your
computer, as well as the computers of everyone
in your contact list. Just visiting a site can start
an automatic download of a virus.

11
WI-FI EAVESDROPPING
WiFi eavesdropping is another method used by
cyber criminals to capture personal information.
Virtual “listening in” on information that's
shared over an unsecure (not encrypted) WiFi
network.

12
WORMS
Worms are a common threat to computers and
the Internet as a whole. A worm, unlike a virus,
goes to work on its own without attaching itself
to files or programs. It lives in your computer
memory, doesn't damage or alter the hard drive
and propagates by sending itself to other
computers in a network – whether within a
company or the Internet itself.

13
THANK YOU.

14

You might also like