4. 1. MALWARE
A. VIRUS – a malicious program
designed to replicate itself and
transfer from one computer to
another either through the
Internet and local networks or
data storage like flash drives and
CDs.
5.
6. 1. MALWARE
B. WORM– a malicious program that
transfers from one computer to
another by any type of means. Often,
it uses a computer network to spread
itself. For example, the ILOVEYOU
worm(Love Bug Worm) created by a
Filipino.
7.
8. 1. MALWARE
C. TROJAN– a malicious program
that is disguised as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
9. 1. MALWARE
C. TROJAN
* Rogue security software - tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his/her security but
in reality, they are not protected at
all.
10.
11. 1. MALWARE
D. SPYWARE– a program that runs in
the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
12. 1. MALWARE
D. SPYWARE
* Keyloggers- used to record the
keystroke done by the users. This is
done to steal their password or any other
sensitive information. It can record
email, messages, or any information you
type using your keyboard.
13.
14. 1. MALWARE
E. ADWARE– a program
designed to send
you advertisements,
mostly as pop-ups.
18. 3. PHISHING
It goal is to acquire sensitive personal
information like passwords and credit
card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit
card, or personal information.
19. 3. PHISHING
Pharming – a more complicated
way of phishing where it
exploits the DNS (Domain
Name Service) system.