SlideShare une entreprise Scribd logo
1  sur  23
1. MALWARE
Stands for malicious
software
1. MALWARE
A. VIRUS – a malicious program
designed to replicate itself and
transfer from one computer to
another either through the
Internet and local networks or
data storage like flash drives and
CDs.
1. MALWARE
B. WORM– a malicious program that
transfers from one computer to
another by any type of means. Often,
it uses a computer network to spread
itself. For example, the ILOVEYOU
worm(Love Bug Worm) created by a
Filipino.
1. MALWARE
C. TROJAN– a malicious program
that is disguised as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
1. MALWARE
C. TROJAN
* Rogue security software - tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his/her security but
in reality, they are not protected at
all.
1. MALWARE
D. SPYWARE– a program that runs in
the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
1. MALWARE
D. SPYWARE
* Keyloggers- used to record the
keystroke done by the users. This is
done to steal their password or any other
sensitive information. It can record
email, messages, or any information you
type using your keyboard.
1. MALWARE
E. ADWARE– a program
designed to send
you advertisements,
mostly as pop-ups.
2. SPAM
Unwanted email
mostly from bots or
advertisers. It can be
used to send malware.
3. PHISHING
It goal is to acquire sensitive personal
information like passwords and credit
card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit
card, or personal information.
3. PHISHING
Pharming – a more complicated
way of phishing where it
exploits the DNS (Domain
Name Service) system.
Internet Threats
Internet Threats
Internet Threats
Internet Threats

Contenu connexe

Tendances

Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
E-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptxE-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptxLeah Condina
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Jesus Rances
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Advanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesAdvanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesMark Jhon Oxillo
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content DevelopmentAngelito Quiambao
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
 

Tendances (20)

Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
Internet threats
Internet threatsInternet threats
Internet threats
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
E-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptxE-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptx
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Advanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesAdvanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment Technologies
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 

Similaire à Internet Threats

Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMarcJohnLumambas
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxMichael Montarde
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology EducationSummerpair77
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsJeremy Flores
 

Similaire à Internet Threats (20)

Malware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHSMalware PowerPoint Presentation E-tech SHS
Malware PowerPoint Presentation E-tech SHS
 
Internet threats
Internet threatsInternet threats
Internet threats
 
MALWARE
MALWAREMALWARE
MALWARE
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computervirus
Computervirus Computervirus
Computervirus
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Senior Education
Senior EducationSenior Education
Senior Education
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 
MALWARE.pptx
MALWARE.pptxMALWARE.pptx
MALWARE.pptx
 

Plus de Leelet1121

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteLeelet1121
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationLeelet1121
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk DancesLeelet1121
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An ArtLeelet1121
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of DanceLeelet1121
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Leelet1121
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportLeelet1121
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceLeelet1121
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole PersonLeelet1121
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challengesLeelet1121
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mindLeelet1121
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brainLeelet1121
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesLeelet1121
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationLeelet1121
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports EventsLeelet1121
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
 

Plus de Leelet1121 (20)

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance Etiquette
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor Recreation
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk Dances
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An Art
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of Dance
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a Sport
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late Adolescence
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole Person
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challenges
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mind
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brain
 
3. Lesson 1.B
3. Lesson 1.B3. Lesson 1.B
3. Lesson 1.B
 
Sports ppt6
Sports ppt6Sports ppt6
Sports ppt6
 
Sports ppt5
Sports ppt5Sports ppt5
Sports ppt5
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor Activities
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor Recreation
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports Events
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 

Dernier

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Dernier (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Internet Threats

  • 1.
  • 2.
  • 3. 1. MALWARE Stands for malicious software
  • 4. 1. MALWARE A. VIRUS – a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
  • 5.
  • 6. 1. MALWARE B. WORM– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm(Love Bug Worm) created by a Filipino.
  • 7.
  • 8. 1. MALWARE C. TROJAN– a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 9. 1. MALWARE C. TROJAN * Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
  • 10.
  • 11. 1. MALWARE D. SPYWARE– a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 12. 1. MALWARE D. SPYWARE * Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
  • 13.
  • 14. 1. MALWARE E. ADWARE– a program designed to send you advertisements, mostly as pop-ups.
  • 15.
  • 16. 2. SPAM Unwanted email mostly from bots or advertisers. It can be used to send malware.
  • 17.
  • 18. 3. PHISHING It goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
  • 19. 3. PHISHING Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.