Dangers
Dangers
Technology
Online
Safety and
Security
Also known as junk email, it is usually
unsolicited commercial email sent from
one source with identical message set to
Email Spam
multiply recipients. Dangerous spam carry
virus like trojan horse and other malicious
software (malware).
Spammer is the term used to refer to a
person who create electronic spam.
This refers to deceitful email practice in
which the sender address is change. So that
it would appear to have come from a
Email Spoofing
different sources usually someone you know.
Usually, the reply to address is the source of
the email, and when you unknowingly reply
to it you would be replying to the one who
spoofed you.
Phishing
This is deceitful practice of trying to get confidential
information such as passwords and usernames, ad
credit card details by making it appear as if it comes
from trustworthy source. Phishing is usually done by
email or other similar means using a popular entity
such as Microsoft, Yahoo, Google, Amazon, and
financial institutions to lure you to their website.
This is dangerous hacker attack on website
which directs all traffic to the website to
another fictitious website. The main object
of pharming is to obtain username and
password, as well as credit card and
financial information, and use these to steal
their money electronically or us the credit
card of the victims.
Pharming
Spyware
This is a computer program that
installed covertly on a person computer
to collect information or event take
control over the computer without the
knowledge of the user. A spyware
program would be able to monitor the
collect information about the user and
his internet habits and practices.
This is dangerous computer program that
replicates itself through a network. Some
worm delete files, other disrupt the network
Computer Worm
function and still, other send junk email from
infected computer. Computer worm usually
spreads by exploiting weaknesses in operating
system, and manufacturers of this software
regularly send free updates to clients to
prevent the spread of the worms.
Trojan
H This is from malware
fronting to perform a good
O task , but covertly perform
R undesirable function with the
intention of entering
S computer without the user’s
E consent.
Computer
This is a program that duplicates V
itself and then infects the computer.
The virus can also be transferred by I
using of removable storage media R
such as a diskette, CF, flash drive,
memory card, and others. U
S
THIS IS A PRSONG WHO
IS ABLE TO ENTER AND
Hacker
CONTROL OTHER
PEOPLE’S COMPUTERS
WITHOUT
AUTORIZATION.
The internet is a powerful
tool for learning and
communicating with
people. However, there
are many dangers that
you must watch out for.