Professional Documents
Culture Documents
TLE205 Topic3
TLE205 Topic3
RESOURCE WITH
CONTROL AND
PRIVACY
FAKE NEWS VS FALSE INFORMATION
a swindler who
tries to gain the
confidence of the
victim in order to
defraud
NOW YOU SEE THEM
MALWARE
➢ short term for Malicious Software
➢ computer software sent by attackers to inflict chaos on a
computer’s operation and processes.
➢ Most of the time, this program is disguised as enticing Web
sites.
➢ Malwares are used to spy upon the activity of the computer
and steal information
3 types of Malware
Virus
➢ A computer virus attaches itself to a
program or file enabling it to spread
from one computer to another, leaving
infections as it travels.
➢ Like a human virus, a computer virus
can range in severity: some may
cause only mildly annoying effects
while others can damage your
hardware, software or files.
➢ Almost all viruses are attached to an
executable file, which means the virus
may exist on your computer but it
actually cannot infect your computer
unless you run or open the malicious
program.
Worm
➢ A worm is similar to a virus by design
and is considered to be a sub-class
of a virus.
➢ Worms spread from computer to
computer, but unlike a virus, it has
the capability to travel without any
human action.
➢ A worm takes advantage of file or
information transport features on
your system, which is what allows it
to travel unaided.
Trojan
➢ A Trojan Horse is full of as much
trickery as the mythological Trojan
Horse it was named after.
➢ The Trojan Horse, at first glance will
appear to be useful software but will
actually do damage once installed or
run on your computer.
➢ Those on the receiving end of a Trojan
Horse are usually tricked into opening
them because they appear to be
receiving legitimate software or files
from a legitimate source.
3 types of Malware
~ STALKERS
OVERSHARING!
To fill up spare time
To stay in touch with what friends are doing
To find funny or
WHY DO
General entertaining content
networking with
other people
PEOPLE USE To share my opinion
To share photos or
SOCIAL Because friends are
MEDIA?
videos with others already on them
Online predators are individuals who commit child sexual abuse that begins or takes place on the
Internet.
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
HYPERTEXT TRANSFER PROTOCOL SECURE
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
3. Visit SECURE WEBSITES
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
3. Visit SECURE WEBSITES
4. Be careful with your DOWNLOADS
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
3. Visit SECURE WEBSITES
4. Be careful with your DOWNLOADS
5. Secure your accounts with STRONG PASSWORD!
3 month p@$$w0rd rule
BUT SERIOUSLY…
Make it complicated
and treat it like your
toothbrush or
underwear.
THANK
YOU