SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
HOW TO NAVIGATE
THROUGH INTERNET
SAFELY
T a b l e o f
C o n t e n t s
Malware
Internet Scams
Cyberbullying
System Defense
2.
3.
4.
1.
WHAT IS
MALWARE?
MALWARE - ( "malicious software") is a
computer program that is created with
the intention of causing damage,
infecting the system or gaining
unauthorized access to the target
device or data.
VIRUS - A self-replicating program,
when launched, can infect existing files
and spreads by launching them. They
can cause data corruption, slow down
the system, or even prevent it from
working properly.
KEYLOGGER - Malicious software that
secretly records and tracks keystrokes
on a computer keyboard. Its purpose is
to obtain sensitive information such as
passwords, bank details or other
confidential information. Logged data
are transferred to the attacker.
BACKDOOR - is a technique that
malware can use to gain unauthorized
access to a system or to allow remote
control of an infected device without the
user's knowledge.
TROJAN HORSE - disguises itself as a
legitimate program but actually
contains hidden malicious functionality
CRYPTOJACKING
Cryptojacking is a technique
of exploiting a computer's
computing power to mine
cryptocurrencies without the
user's knowledge or consent.
Cryptominer malware infects
a device and uses its
computing resources to mine
cryptocurrencies, which can
lead to system slowdowns,
power drains, and increased
hardware wear and tear.
Cryptomining malware is
often spread through
infected websites, spam
emails, or illegal software.
INTERNET SCAMS
Nigerian Prince - is very well known
scam. The attackers send emails
impersonating a wealthy Nigerian prince
or other important person, promising a
large financial reward in exchange for
help transferring money abroad. The
victim is then asked to pay fees, bribes or
processing costs, but no money is ever
received. Attackers take advantage of
victims' greed and gullibility.
Malvertising - is a fraudulent method
where malicious code is hidden in online
advertisements. Attackers inject
malicious code into ad networks or
websites, allowing the devices of visitors
to those sites to be infected.
When a user clicks on an infected ad,
they may be redirected to pages
containing malware that can steal
sensitive information, install additional
malware, or cause other damage to the
device.
Deepfake - is an artificial intelligence
technique that creates fake videos or
images that look real. It is used to
combine and manipulate existing
content so that it is possible to replace
people's faces in videos, create fake
conversations or even create fake events.
Deepfake has the potential to be
misused to spread misinformation,
attack reputations, and manipulate
public opinion.
PHISHING:
A form of cyber attack in
which attackers attempt to
obtain sensitive
information from users by
impersonating a trusted
entity such as a bank,
company, or government
organization.
Attackers typically use
fake emails, websites or
messages that look
authentic and ask users to
provide their logins,
passwords, payment
details or other sensitive
information.
CYBERBULLYING
Cyberbullying is a form of harassment,
intimidation or abuse of people through
online means such as social media,
computer games or messages. It can
include posting hate messages, creating
fake profiles, hate blogs and websites,
sharing sensitive or degrading content
or verbal abuse online.
The EU Kids Online 2020 project
states that a total of 15 percent of
Czech children aged 9-17 who use
the Internet were victims of online
aggression.
Cyberbullying can have serious
consequences for victims, including
psychological harm, reduced self-
confidence and can even lead to suicide.
Cyberstalking - a form of harassment
and stalking of an individual online by
constantly monitoring their activity,
gathering information and using digital
means to scare and intimidate. Attackers
can use social media, email messages, or
other communication channels to
invade their victim's privacy.
While blocking a person on social media
can provide some level of protection, it is
not a guaranteed way to completely get
rid of cyberstalking harassment.
Attackers may use other accounts or
means of communication to continue
harassing the victim. Additionally,
blocking may not stop an attacker from
monitoring public posts or collecting
information about the victim from
others. Therefore, it is important to
inform the administrators of the given
network about the problem or, if
necessary, contact the legal authorities.
CYBERGROOMING
Is a process in which the
perpetrator uses the
Internet to build false
trust in a stranger with
the aim of sexual or
economic abuse.
Attackers often pose as
young people and use
various online platforms,
social media or chat
applications to make
contact with potential
victims.
According to the
cybergrooming.cz portal,
the latency of this
phenomenon is so high
that only 10% of victims
report this behavior.
ANTIVIRUS
SOFTWARE
Antiviruses detect malicious programs
using a method that relies on a database
of known malicious codes, so-called virus
definitions or signatures. The antivirus
checks the files and looks for malicious
code signatures stored in the
aforementioned virus database. Since
new threats are constantly emerging, it
is important to update the database
regularly.
In some cases, it can happen that even
common software can be falsely
identified as a virus, in which case it is a
"false positive".
If a threat is detected, antivirus software
takes actions such as quarantining or
deleting infected files, and provides
users with alerts and protection against
other threats.
Before running any software,
the software is first quickly
scanned in the background
by an anti-virus program.
However, cyber security as
such is not a product and is
not the same as owning an
antivirus. The best way to
avoid cyber threats is with
good cyber habits and a high
level of awareness.
POLYMORPHIC
MALICIOUS CODES
In order for the virus to escape
detection due to signatures,
new, more complex viruses use
encryption, during which they
can change their form several
times.
Therefore, the antivirus program
has to apply other methods to
detect the virus, some of which
remain largely unrecognized.
Therefore, in order for the
antivirus to properly analyze and
decrypt the files, sufficient
computing power is required
and becomes more demanding.
It is estimated that up
to 90% of malicious
codes are polymorphic.

Contenu connexe

Similaire à ESC Information Booklet EN

Similaire à ESC Information Booklet EN (20)

Computer security
Computer securityComputer security
Computer security
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
cyber crime
cyber crime cyber crime
cyber crime
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attack
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Plus de Pavel26766

Plus de Pavel26766 (20)

European Citizenship - Be Modern, Be Successful
European Citizenship - Be Modern, Be SuccessfulEuropean Citizenship - Be Modern, Be Successful
European Citizenship - Be Modern, Be Successful
 
Be Modern, Be Successful - 2 Years Social Media Plan
Be Modern, Be Successful - 2 Years Social Media Plan Be Modern, Be Successful - 2 Years Social Media Plan
Be Modern, Be Successful - 2 Years Social Media Plan
 
ESC Příběhová Brožurka CZ
ESC Příběhová Brožurka CZESC Příběhová Brožurka CZ
ESC Příběhová Brožurka CZ
 
ESC Informační Brožurka CZ
ESC Informační Brožurka CZESC Informační Brožurka CZ
ESC Informační Brožurka CZ
 
Drugs and Cybercrimes
Drugs and CybercrimesDrugs and Cybercrimes
Drugs and Cybercrimes
 
Art as a Way of Fighting Addiction
Art as a Way of Fighting AddictionArt as a Way of Fighting Addiction
Art as a Way of Fighting Addiction
 
Cases Of Overdose Among Young People In Lithuania
Cases Of Overdose Among Young People In LithuaniaCases Of Overdose Among Young People In Lithuania
Cases Of Overdose Among Young People In Lithuania
 
Illegal Narcotics Black Sea Trade in Romania
Illegal Narcotics Black Sea Trade in RomaniaIllegal Narcotics Black Sea Trade in Romania
Illegal Narcotics Black Sea Trade in Romania
 
Camorra, 'Ndrangheta and Illegal Drug trade in Italy
Camorra, 'Ndrangheta and Illegal Drug trade in ItalyCamorra, 'Ndrangheta and Illegal Drug trade in Italy
Camorra, 'Ndrangheta and Illegal Drug trade in Italy
 
Use and History of Illegal Substances
Use and History of Illegal SubstancesUse and History of Illegal Substances
Use and History of Illegal Substances
 
Coursera - Erasmus+
Coursera - Erasmus+Coursera - Erasmus+
Coursera - Erasmus+
 
Skillshare - Erasmus+
Skillshare - Erasmus+Skillshare - Erasmus+
Skillshare - Erasmus+
 
Youtube - Erasmus+
Youtube - Erasmus+Youtube - Erasmus+
Youtube - Erasmus+
 
Udacity - Erasmus+
Udacity - Erasmus+Udacity - Erasmus+
Udacity - Erasmus+
 
Financial Literacy and Youth Unemployment in Romania.pdf
Financial Literacy and Youth Unemployment in Romania.pdfFinancial Literacy and Youth Unemployment in Romania.pdf
Financial Literacy and Youth Unemployment in Romania.pdf
 
Financial Literacy and Youth Unemployment in Serbia.pdf
Financial Literacy and Youth Unemployment in Serbia.pdfFinancial Literacy and Youth Unemployment in Serbia.pdf
Financial Literacy and Youth Unemployment in Serbia.pdf
 
Financial Literacy and Youth Unemployment in Poland.pdf
Financial Literacy and Youth Unemployment in Poland.pdfFinancial Literacy and Youth Unemployment in Poland.pdf
Financial Literacy and Youth Unemployment in Poland.pdf
 
SR-EN Priručnik za mlade nezaposlene ljude u Srbiji
SR-EN Priručnik za mlade nezaposlene ljude u SrbijiSR-EN Priručnik za mlade nezaposlene ljude u Srbiji
SR-EN Priručnik za mlade nezaposlene ljude u Srbiji
 
RO Un Manual Pentru Tinerii Neangajati 2022
RO Un Manual Pentru Tinerii Neangajati 2022RO Un Manual Pentru Tinerii Neangajati 2022
RO Un Manual Pentru Tinerii Neangajati 2022
 
EN A Manual for Young Unemployed in Romania 2022
EN A Manual for Young Unemployed in Romania 2022EN A Manual for Young Unemployed in Romania 2022
EN A Manual for Young Unemployed in Romania 2022
 

Dernier

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
MinawBelay
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Dernier (20)

Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Essential Safety precautions during monsoon season
Essential Safety precautions during monsoon seasonEssential Safety precautions during monsoon season
Essential Safety precautions during monsoon season
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTrain
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 

ESC Information Booklet EN

  • 1. HOW TO NAVIGATE THROUGH INTERNET SAFELY
  • 2. T a b l e o f C o n t e n t s Malware Internet Scams Cyberbullying System Defense 2. 3. 4. 1.
  • 3. WHAT IS MALWARE? MALWARE - ( "malicious software") is a computer program that is created with the intention of causing damage, infecting the system or gaining unauthorized access to the target device or data. VIRUS - A self-replicating program, when launched, can infect existing files and spreads by launching them. They can cause data corruption, slow down the system, or even prevent it from working properly. KEYLOGGER - Malicious software that secretly records and tracks keystrokes on a computer keyboard. Its purpose is to obtain sensitive information such as passwords, bank details or other confidential information. Logged data are transferred to the attacker. BACKDOOR - is a technique that malware can use to gain unauthorized access to a system or to allow remote control of an infected device without the user's knowledge. TROJAN HORSE - disguises itself as a legitimate program but actually contains hidden malicious functionality
  • 4. CRYPTOJACKING Cryptojacking is a technique of exploiting a computer's computing power to mine cryptocurrencies without the user's knowledge or consent. Cryptominer malware infects a device and uses its computing resources to mine cryptocurrencies, which can lead to system slowdowns, power drains, and increased hardware wear and tear. Cryptomining malware is often spread through infected websites, spam emails, or illegal software.
  • 5. INTERNET SCAMS Nigerian Prince - is very well known scam. The attackers send emails impersonating a wealthy Nigerian prince or other important person, promising a large financial reward in exchange for help transferring money abroad. The victim is then asked to pay fees, bribes or processing costs, but no money is ever received. Attackers take advantage of victims' greed and gullibility. Malvertising - is a fraudulent method where malicious code is hidden in online advertisements. Attackers inject malicious code into ad networks or websites, allowing the devices of visitors to those sites to be infected. When a user clicks on an infected ad, they may be redirected to pages containing malware that can steal sensitive information, install additional malware, or cause other damage to the device. Deepfake - is an artificial intelligence technique that creates fake videos or images that look real. It is used to combine and manipulate existing content so that it is possible to replace people's faces in videos, create fake conversations or even create fake events. Deepfake has the potential to be misused to spread misinformation, attack reputations, and manipulate public opinion.
  • 6. PHISHING: A form of cyber attack in which attackers attempt to obtain sensitive information from users by impersonating a trusted entity such as a bank, company, or government organization. Attackers typically use fake emails, websites or messages that look authentic and ask users to provide their logins, passwords, payment details or other sensitive information.
  • 7. CYBERBULLYING Cyberbullying is a form of harassment, intimidation or abuse of people through online means such as social media, computer games or messages. It can include posting hate messages, creating fake profiles, hate blogs and websites, sharing sensitive or degrading content or verbal abuse online. The EU Kids Online 2020 project states that a total of 15 percent of Czech children aged 9-17 who use the Internet were victims of online aggression. Cyberbullying can have serious consequences for victims, including psychological harm, reduced self- confidence and can even lead to suicide. Cyberstalking - a form of harassment and stalking of an individual online by constantly monitoring their activity, gathering information and using digital means to scare and intimidate. Attackers can use social media, email messages, or other communication channels to invade their victim's privacy. While blocking a person on social media can provide some level of protection, it is not a guaranteed way to completely get rid of cyberstalking harassment. Attackers may use other accounts or means of communication to continue harassing the victim. Additionally, blocking may not stop an attacker from monitoring public posts or collecting information about the victim from others. Therefore, it is important to inform the administrators of the given network about the problem or, if necessary, contact the legal authorities.
  • 8. CYBERGROOMING Is a process in which the perpetrator uses the Internet to build false trust in a stranger with the aim of sexual or economic abuse. Attackers often pose as young people and use various online platforms, social media or chat applications to make contact with potential victims. According to the cybergrooming.cz portal, the latency of this phenomenon is so high that only 10% of victims report this behavior.
  • 9. ANTIVIRUS SOFTWARE Antiviruses detect malicious programs using a method that relies on a database of known malicious codes, so-called virus definitions or signatures. The antivirus checks the files and looks for malicious code signatures stored in the aforementioned virus database. Since new threats are constantly emerging, it is important to update the database regularly. In some cases, it can happen that even common software can be falsely identified as a virus, in which case it is a "false positive". If a threat is detected, antivirus software takes actions such as quarantining or deleting infected files, and provides users with alerts and protection against other threats. Before running any software, the software is first quickly scanned in the background by an anti-virus program. However, cyber security as such is not a product and is not the same as owning an antivirus. The best way to avoid cyber threats is with good cyber habits and a high level of awareness.
  • 10. POLYMORPHIC MALICIOUS CODES In order for the virus to escape detection due to signatures, new, more complex viruses use encryption, during which they can change their form several times. Therefore, the antivirus program has to apply other methods to detect the virus, some of which remain largely unrecognized. Therefore, in order for the antivirus to properly analyze and decrypt the files, sufficient computing power is required and becomes more demanding. It is estimated that up to 90% of malicious codes are polymorphic.