ICT Lesson 2.3
ICT Lesson 2.3
Threats
Lesson 2.2
Online Threats
Is deemed any malicious act that attempts to gain
access to a computer network without authorization or
permission to the owners.
1. Phishing
2. Pharming
3. Internet scam
4. Internet Robots
5. Malware
6. Spams
7. Cyberstalking
8. Spoofing
1. PHISHING
Ex: keylogger
3.Virus and Worms
Malwares that attach to another program
and when executed unintentionally by the
user replicates itself by modifying other
computer program and infecting them with
its own bits of code.
4. Trojan/Trojan Horse
One of the most dangerous malware
types. It usually represents itself as
something useful in order to trick you.
Once its on your system it access to
affect your computer.
6. Spam
Are unsolicited emails, instant
messages, coming from
recipients that are not granted
verifiable permission for the
message to be sent. It can be
damaging if you open or
respond to it.
7. Cyberstalking
Refers to the use of the internet or
other electronic device to harass or
stalk individuals or organizations.
8. Cyberbullying
Refers to the act of tormenting,
harassing, or embarrassing another
person using the internet.
9. Spoofing
Happens when someone or
something pretends to be
something else to gain our
confidence, get access to our
system, steal data, steal money,
or spread malware.
Quiz: Directions:
Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
Direction: look at the following images and create a hashtag based on the type of online
threats represented by each image.
1. #____________
2. #__________
3.#_________
4. #_____________