SlideShare une entreprise Scribd logo
1  sur  23
1. MALWARE
Stands for malicious
software
1. MALWARE
A. VIRUS – a malicious program
designed to replicate itself and
transfer from one computer to
another either through the
Internet and local networks or
data storage like flash drives and
CDs.
1. MALWARE
B. WORM– a malicious program that
transfers from one computer to
another by any type of means. Often,
it uses a computer network to spread
itself. For example, the ILOVEYOU
worm(Love Bug Worm) created by a
Filipino.
1. MALWARE
C. TROJAN– a malicious program
that is disguised as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
1. MALWARE
C. TROJAN
* Rogue security software - tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his/her security but
in reality, they are not protected at
all.
1. MALWARE
D. SPYWARE– a program that runs in
the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
1. MALWARE
D. SPYWARE
* Keyloggers- used to record the
keystroke done by the users. This is
done to steal their password or any other
sensitive information. It can record
email, messages, or any information you
type using your keyboard.
1. MALWARE
E. ADWARE– a program
designed to send
you advertisements,
mostly as pop-ups.
2. SPAM
Unwanted email
mostly from bots or
advertisers. It can be
used to send malware.
3. PHISHING
It goal is to acquire sensitive personal
information like passwords and credit
card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit
card, or personal information.
3. PHISHING
Pharming – a more complicated
way of phishing where it
exploits the DNS (Domain
Name Service) system.
Internet Threats
Internet Threats
Internet Threats
Internet Threats

Contenu connexe

Tendances

Tendances (20)

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 
Final exam in empowerment technologies
Final exam in empowerment technologiesFinal exam in empowerment technologies
Final exam in empowerment technologies
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
E-Tech L4 Advanced Spreadsheet Skills.pptx
E-Tech L4 Advanced Spreadsheet Skills.pptxE-Tech L4 Advanced Spreadsheet Skills.pptx
E-Tech L4 Advanced Spreadsheet Skills.pptx
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 

Similaire à Internet Threats

Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 

Similaire à Internet Threats (20)

Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHS
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threats
Internet threatsInternet threats
Internet threats
 
MALWARE
MALWAREMALWARE
MALWARE
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computervirus
Computervirus Computervirus
Computervirus
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Senior Education
Senior EducationSenior Education
Senior Education
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 

Plus de Leelet1121

Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late Adolescence
Leelet1121
 

Plus de Leelet1121 (20)

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance Etiquette
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor Recreation
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk Dances
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An Art
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of Dance
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a Sport
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late Adolescence
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole Person
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challenges
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mind
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brain
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
3. Lesson 1.B
3. Lesson 1.B3. Lesson 1.B
3. Lesson 1.B
 
Sports ppt6
Sports ppt6Sports ppt6
Sports ppt6
 
Sports ppt5
Sports ppt5Sports ppt5
Sports ppt5
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor Activities
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor Recreation
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports Events
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 

Dernier

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Dernier (20)

Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading RoomImplanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 

Internet Threats

  • 1.
  • 2.
  • 3. 1. MALWARE Stands for malicious software
  • 4. 1. MALWARE A. VIRUS – a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
  • 5.
  • 6. 1. MALWARE B. WORM– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm(Love Bug Worm) created by a Filipino.
  • 7.
  • 8. 1. MALWARE C. TROJAN– a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 9. 1. MALWARE C. TROJAN * Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
  • 10.
  • 11. 1. MALWARE D. SPYWARE– a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 12. 1. MALWARE D. SPYWARE * Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
  • 13.
  • 14. 1. MALWARE E. ADWARE– a program designed to send you advertisements, mostly as pop-ups.
  • 15.
  • 16. 2. SPAM Unwanted email mostly from bots or advertisers. It can be used to send malware.
  • 17.
  • 18. 3. PHISHING It goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
  • 19. 3. PHISHING Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.