0% found this document useful (0 votes)
34 views13 pages

Dangers

This document defines and describes various online threats including email spam, email spoofing, phishing, pharming, spyware, computer worms, trojans, viruses, hackers, and emphasizes the importance of online safety and security. Spam is unsolicited commercial email, spoofing deceitfully changes the sender address, and phishing tries to steal personal information by posing as trusted sources. Pharming hijacks website traffic, spyware covertly monitors users, and worms spread through network weaknesses. Trojans appear helpful but perform unwanted tasks, viruses duplicate and infect through removable media, and hackers enter computers without authorization. The internet provides benefits but also dangers that require vigilance.

Uploaded by

rich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views13 pages

Dangers

This document defines and describes various online threats including email spam, email spoofing, phishing, pharming, spyware, computer worms, trojans, viruses, hackers, and emphasizes the importance of online safety and security. Spam is unsolicited commercial email, spoofing deceitfully changes the sender address, and phishing tries to steal personal information by posing as trusted sources. Pharming hijacks website traffic, spyware covertly monitors users, and worms spread through network weaknesses. Trojans appear helpful but perform unwanted tasks, viruses duplicate and infect through removable media, and hackers enter computers without authorization. The internet provides benefits but also dangers that require vigilance.

Uploaded by

rich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 13

Empowerment

Technology
Online
Safety and
Security
Also known as junk email, it is usually
unsolicited commercial email sent from
one source with identical message set to

Email Spam
multiply recipients. Dangerous spam carry
virus like trojan horse and other malicious
software (malware).
Spammer is the term used to refer to a
person who create electronic spam.
This refers to deceitful email practice in
which the sender address is change. So that
it would appear to have come from a

Email Spoofing
different sources usually someone you know.
Usually, the reply to address is the source of
the email, and when you unknowingly reply
to it you would be replying to the one who
spoofed you.
Phishing
This is deceitful practice of trying to get confidential
information such as passwords and usernames, ad
credit card details by making it appear as if it comes
from trustworthy source. Phishing is usually done by
email or other similar means using a popular entity
such as Microsoft, Yahoo, Google, Amazon, and
financial institutions to lure you to their website.
This is dangerous hacker attack on website
which directs all traffic to the website to
another fictitious website. The main object
of pharming is to obtain username and
password, as well as credit card and
financial information, and use these to steal
their money electronically or us the credit
card of the victims.

Pharming
Spyware
This is a computer program that
installed covertly on a person computer
to collect information or event take
control over the computer without the
knowledge of the user. A spyware
program would be able to monitor the
collect information about the user and
his internet habits and practices.
This is dangerous computer program that
replicates itself through a network. Some
worm delete files, other disrupt the network

Computer Worm
function and still, other send junk email from
infected computer. Computer worm usually
spreads by exploiting weaknesses in operating
system, and manufacturers of this software
regularly send free updates to clients to
prevent the spread of the worms.
Trojan
H This is from malware
fronting to perform a good
O task , but covertly perform
R undesirable function with the
intention of entering
S computer without the user’s
E consent.
Computer
This is a program that duplicates V
itself and then infects the computer.
The virus can also be transferred by I
using of removable storage media R
such as a diskette, CF, flash drive,
memory card, and others. U
S
THIS IS A PRSONG WHO
IS ABLE TO ENTER AND
Hacker
CONTROL OTHER
PEOPLE’S COMPUTERS
WITHOUT
AUTORIZATION.
The internet is a powerful
tool for learning and
communicating with
people. However, there
are many dangers that
you must watch out for.

You might also like