0% found this document useful (0 votes)
23 views21 pages

ICT Lesson 2.3

Uploaded by

kathryn.teves99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views21 pages

ICT Lesson 2.3

Uploaded by

kathryn.teves99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Kinds of Online

Threats

Lesson 2.2
Online Threats
Is deemed any malicious act that attempts to gain
access to a computer network without authorization or
permission to the owners.

These are usually done by the computer hacker who


uses the WWW. they benefit cyber criminals by
stealing information for subsequent sales.
The following are the top kinds of online threats that you should be aware
of:

1. Phishing
2. Pharming
3. Internet scam
4. Internet Robots
5. Malware
6. Spams
7. Cyberstalking
8. Spoofing
1. PHISHING

Happens when an email is


sent from an internet
criminal disguised as an
email from a legitimate,
trustworthy source . the
message is meant to lure you
into revealing sensitive or
confidential information
2. PHARMING
Happens when a hacker(pharmer)
directs an internet user to a fake
website instead of a legitimate one.
these spoofed sites can capture a
victim´s confidential information
including usernames, passwords, and
credit card data

Pharmers usually focus on websites in


the financial sectors.
3. Internet Scam
Generally refers to someone using
internet services or software to
defraud or take advantage of victims
for personal reason.

Cyber criminals may contact


potential victim through work, email Tip
accounts, social networking sites, or
Dont trust and
even dating apps. Or may come in easily get attached
various forms such as lottery scam, by lovely words
job offer scam charity fraud scam
and dating scam.
4. Internet Robots
Also known as spiders, crawlers, and
web bots. It is a software application
that is programmed to do a certain task.
Bots are automated which means they
run according to their instructions
without a human user. Other bots are
bad and are programmed to break into
user accounts,scan the web for contact
information for sending spams, or
perform malicious activities.
Like spam spreading
5. Malware

Or malicious software is any program


or file that is harmful to a computer
user.

Most common offenders in malware:


Tip
1. Adware
Tell the audience about the
2. Spyware
problem through a story,
ideally a person.
3. Virus and worms
4. Trojan/ trojan horse
5. Ransomware
1. Adware(advertising
supported software)
Unwanted software designed to
throw advertisements up on you Tip
screen. If one example isn’t
sufficient to help people
understand the breadth of
Ex: pop up ads, banner ads your idea, pick a couple of
examples.
2. Spyware

Is a malware that secretly observes the


computer users activities without
permission and reports it to the
softwares author

Ex: keylogger
3.Virus and Worms
Malwares that attach to another program
and when executed unintentionally by the
user replicates itself by modifying other
computer program and infecting them with
its own bits of code.
4. Trojan/Trojan Horse
One of the most dangerous malware
types. It usually represents itself as
something useful in order to trick you.
Once its on your system it access to
affect your computer.

It can be used to steal finance


information or install threats.

Ex: information stealer trojan


5.Ransomware
Form of malware that locks you out of
your device and encrypt your files, then
focus you to pay a ransom to get them
back.
While some simple ransomware
may lock the system without
damaging any files, more advanced
malware uses a technique called
cryptoviral extortion.
Kinds of online threats

6. Spam
Are unsolicited emails, instant
messages, coming from
recipients that are not granted
verifiable permission for the
message to be sent. It can be
damaging if you open or
respond to it.
7. Cyberstalking
Refers to the use of the internet or
other electronic device to harass or
stalk individuals or organizations.
8. Cyberbullying
Refers to the act of tormenting,
harassing, or embarrassing another
person using the internet.
9. Spoofing
Happens when someone or
something pretends to be
something else to gain our
confidence, get access to our
system, steal data, steal money,
or spread malware.
Quiz: Directions:
Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.

1.What type of malicious program is designed to replicate itself and


transfer from one computer to another either through the internet or
local networks or data storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomware

2. What harmful online programs are designed to send you


advertisements,mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
3. What harmful online program is used to record keystrokes done by
users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware

4. What is ransomware based on?


A. Fear of hackers B. Fear of the Interne C. Fear of spyware
D. Fear of losing important files?

5. Which of the following must NOT be done if you received an embarrassing


picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
Assignment: show me how you hashtag ¼ paper

Direction: look at the following images and create a hashtag based on the type of online
threats represented by each image.

1. #____________
2. #__________

3.#_________
4. #_____________

Quotes for illustration purposes only

You might also like