0% found this document useful (0 votes)
13 views30 pages

Emtech Day 4

The document discusses different types of online threats including phishing, pharming, malware, spam, cyberstalking, cyberbullying, and spoofing. It provides details on each type such as how phishing uses fake emails to steal information and pharming redirects users to fake websites. Malware is discussed including types like viruses, worms, trojans, ransomware, spyware and adware. The document also briefly mentions internet robots, internet scams, and defines institution.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views30 pages

Emtech Day 4

The document discusses different types of online threats including phishing, pharming, malware, spam, cyberstalking, cyberbullying, and spoofing. It provides details on each type such as how phishing uses fake emails to steal information and pharming redirects users to fake websites. Malware is discussed including types like viruses, worms, trojans, ransomware, spyware and adware. The document also briefly mentions internet robots, internet scams, and defines institution.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

EMPOWERME

NT
TECHNOLOGY
FOR
PROFESSIONA
L TRACT
KINDS OF
ONLINE THREAT
Online threat is deemed any
malicious act that attempts to gain
access to a computer network without
authorization or permission from the
owners. These are usually done by
computer hackers who uses the World
Wide Web to facilitate cybercrime.
Web threats use multiple types of
malware and fraud, all of which
utilize HTTP or HTTPS protocols,
but may also employ other protocols
and components, such as links in
email or Instant Messaging apps, or
any malware attachments on servers
Web threats pose a broad range of
risks, including financial damages,
identity theft, loss of confidential
information/data, theft of network
resources, damaged brand/personal
reputation, and erosion of consumer
confidence in e-commerce and online
The following are the top kinds of online
threats that you should be aware of:

Phishing happens when an email is sent


from an internet criminal disguised as an
email from a legitimate, trustworthy
source. The message is meant to lure you
into revealing sensitive or confidential
information.

1.Phishing
 Pharming happens when a hacker (or “pharmer”)
directs an internet user to a fake website instead of
a legitimate one. These “spoofed” sites can capture
a victim’s confidential information, including
usernames, passwords, and credit card data, or
install malware on their computer. Pharmers usually
focus on websites in the financial sector, including
banks, online payment platforms, or other e-
commerce destinations.

2. Pharming
PHISHING VS PHARMING

Internet Scam generally refers


to someone using internet
services or software to defraud
or take advantage of victims,
typically for financial gain.

Internet Scam
 Internet robots are also known as spiders,
crawlers, and web bots. It is a software application
that is programmed to do certain tasks. Bots are
automated, which means they run according to their
instructions without a human user. Some bots are
useful, such as search engine bots that index
content for search or customer service bots that
help users.

Internet robots

Malware or malicious software


is any program or file that is
harmful to a computer user.

3. Malware
Here are the most common offenders in the
rogues’ gallery of malware:
ADWARE
Adware (advertising supported
software) is unwanted software
designed to throw advertisements
up on your screen. Example, pop-
up ads and banner ads.
SPYWARE

Spyware is malware that secretly


observes the computer user’s
activities without permission and
reports it to the software’s author.
Example is a keylogger.
VIRUS AND WORMS

 Virus and Worms are malwares that


attach to another program and, when
executed—unintentionally by the user—
replicates itself by modifying other
computer programs and infecting them
with its own bits of code.
TROJAN HORSE
Trojan, or Trojan horse, is one of the most
dangerous malware types. It usually represents itself
as something useful in order to trick you. Once it is
on your system, the attackers behind the Trojan gain
unauthorized access to the affected computer. From
there, Trojans can be used to steal financial
information or install threats like viruses and
ransomware.
RANSOMWARE

Ransomware is a form of
malware that locks you out of your
device and/or encrypts your files,
then forces you to pay a ransom to
get them back.
 Spams are unsolicited emails, instant
messages coming from recipients that
are not granted verifiable permission
for the message to be sent. Spam
messages can be damaging if you open
or respond to it.

4. Spams

Cyberstalking refers to the


use of the internet or other
electronic device to harass or
stalk individuals or
organizations.
5. Cybertalking
Cyberbullying refers to the
act of tormenting, harassing,
or embarrassing another
person using the internet.

6. Cyberbullying

Spoofing happens when someone or


something pretends to be something
else to gain our confidence, get
access to our systems, steal data,
steal money, or spread malware.

7. Spoofing
American sociologists Paul Horton and Chester Hunt
(1964) defined institution as an organized system of social
system of social relationships that represent a society’s
common values and procedures. This is a stable, valued,
recurring pattern that guides the behavior of people in
society. Once the elements of culture become so integrated
that activities are already formalized on a unit basis,
institutions surface in society.
WELL MEET AGAIN!

You might also like