Emtech Day 4
Emtech Day 4
NT
TECHNOLOGY
FOR
PROFESSIONA
L TRACT
KINDS OF
ONLINE THREAT
Online threat is deemed any
malicious act that attempts to gain
access to a computer network without
authorization or permission from the
owners. These are usually done by
computer hackers who uses the World
Wide Web to facilitate cybercrime.
Web threats use multiple types of
malware and fraud, all of which
utilize HTTP or HTTPS protocols,
but may also employ other protocols
and components, such as links in
email or Instant Messaging apps, or
any malware attachments on servers
Web threats pose a broad range of
risks, including financial damages,
identity theft, loss of confidential
information/data, theft of network
resources, damaged brand/personal
reputation, and erosion of consumer
confidence in e-commerce and online
The following are the top kinds of online
threats that you should be aware of:
1.Phishing
Pharming happens when a hacker (or “pharmer”)
directs an internet user to a fake website instead of
a legitimate one. These “spoofed” sites can capture
a victim’s confidential information, including
usernames, passwords, and credit card data, or
install malware on their computer. Pharmers usually
focus on websites in the financial sector, including
banks, online payment platforms, or other e-
commerce destinations.
2. Pharming
PHISHING VS PHARMING
Internet Scam
Internet robots are also known as spiders,
crawlers, and web bots. It is a software application
that is programmed to do certain tasks. Bots are
automated, which means they run according to their
instructions without a human user. Some bots are
useful, such as search engine bots that index
content for search or customer service bots that
help users.
Internet robots
3. Malware
Here are the most common offenders in the
rogues’ gallery of malware:
ADWARE
Adware (advertising supported
software) is unwanted software
designed to throw advertisements
up on your screen. Example, pop-
up ads and banner ads.
SPYWARE
Ransomware is a form of
malware that locks you out of your
device and/or encrypts your files,
then forces you to pay a ransom to
get them back.
Spams are unsolicited emails, instant
messages coming from recipients that
are not granted verifiable permission
for the message to be sent. Spam
messages can be damaging if you open
or respond to it.
4. Spams
6. Cyberbullying
7. Spoofing
American sociologists Paul Horton and Chester Hunt
(1964) defined institution as an organized system of social
system of social relationships that represent a society’s
common values and procedures. This is a stable, valued,
recurring pattern that guides the behavior of people in
society. Once the elements of culture become so integrated
that activities are already formalized on a unit basis,
institutions surface in society.
WELL MEET AGAIN!