Download presentation
Presentation is loading. Please wait.
Published byangie madelo Modified over 5 years ago
1
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY
4
DANGERS ON THE INTERNET EMAIL SPAM a.k.a. Junk mail usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software(Malware)
5
SITUATIONAL ANALYSIS What is the best way to get rid of JUNK MAILS?
6
DANGERS ON THE INTERNET EMAIL SPOOFING It is a deceitful amail practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know. email spoofing is usually used by spammers to hide the origin of the spam
7
SITUATIONAL ANALYSIS How would you know if someone is spoofing you?
9
DANGERS ON THE INTERNET PHISHING It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appears as if it comes from a trustworthy source. it is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions
10
SITUATIONAL ANALYSIS How would you know if someone is phishing you?
12
DANGERS ON THE INTERNET PHARMING This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. the main objective is to obtain username and passwords as well as credit cards and financial information, and use these to steal their money electronically or use the credit cards of the victims. it is a major concern of many online banking and electronic commerce transactions
13
SITUATIONAL ANALYSIS How would you know if someone is trying to pharm you?
15
DANGERS ON THE INTERNET SPYWARE A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user. it can moniter and collect information about the user's internet habits and practices it can also affect the performance and setting of the computer.
16
SITUATIONAL ANALYSIS What can we do to prevent installing a spyware?
18
DANGERS ON THE INTERNET COMPUTER WORM it is a dangerous computer program that replicates itself through a network some worms delete files, others discrupt the network function it is usually spread through email and running of attachments froms suspicious sources it spreads by exploiting weaknesses in operating systems (but BLESS OS updates)
19
SITUATIONAL ANALYSIS How do we know it is a worming infected file?
21
DANGERS ON THE INTERNET TROJAN HORSE A malware fronting to perform a good task, but covertly performs undesirable function with intention of entering the computer without the user's consent it can disable the computer's defenses, opening it to unauthorized entry. It can erase data, can corrupt files and allow access to computer.
22
How do we know it is a trojan horse- infected file?
24
DANGERS ON THE INTERNET COMPUTER VIRUSES It is a program that duplicates itself and then infects the computer. It spreads like a biological virus. it can be transferred by the use of removable storage media devices. damages may be mild to severe
25
How do we know it is a virus-infected file?
26
DANGERS ON THE INTERNET HACKER This is a person who is able to enter control other people's computer without authorization. usually vandalzes the victim's website, steal personal information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers
27
How do we know you are being hacked?
28
What are the dangers can we meet encounter in the internet?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.