Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

The Internet of Things (IoT) is a network of hardware, sensors, and sources.

Damage caused by spamming are:


software connected via the internet. The IoT enables increasingly Phishing - Usually ‘phishing’ using a trusted institution name so we
efficient transmission of data, not only between devices and humans, want to open it.
but among devices as well. The IoT is used in many different sectors, Spear phishing (targets specific people or departments)
ranging from retail, healthcare, and logistics to government, finance, Whale phishing (targets important people like CEOs)
and construction. SMiShing (phishing via text messages) and vishing (voice
phishing that takes place over the phone, usually through
 A smart classroom is an educational space that is equipped impersonation).
with technology to enhance the teaching and learning Pharming - Make us to enter a site that cheat. Then the “thieves”
include software that is “evil” into our computer. Then make us always
experience.
to the wrong sites, although we have entered the correct address
 Smart library can include digital catalogs and databases, Cookies - A small piece of data sent from a website and stored in the
automated checkout systems, self-service kiosks, RFID web browser of the user. These cookies help
tagging for inventory management, and digital lending of e- track user’s browsing sessions and load information faster, but create
books and other electronic resources. some security and privacyconcerns as well.
 Smart Learner IoT in education aims to create smart SPYWARE - Spyware is designed to gather information about a
learners by enabling personalized learning experiences person or organization without their knowledge or consent. It can track
through technology and analytics. a user's internet browsing habits, record keystrokes, capture
Convergence allows users to perform multiple tasks with just a single passwords, and collect other sensitive information.
device, which saves time, offers convenience, conserves space, and ADWARE - Primarily focused on displaying unwanted
can be less costly. advertisements on a user's computer. While adware can be annoying
and intrusive, it is typically not as malicious as spyware. Adware may
Portability refers to the ability of collaborative technology to be easily
track some user information to display targeted ads, but its main goal
moved or carried.
is to generate revenue through advertising.
Personalization in collaborative technology refers to the ability to RANSOMWARE - Ransomware is a type of malicious software that
customize the technology to meet individual preferences and needs. encrypts your files or locks you out of your computer, and then
Collaborative technology is a tool or software designed to facilitate demands a ransom payment in exchange for restoring access.
working in groups and holding real-time meetings in the office and BROWSER & SEARCH HIJACKING - Browser hijacking occurs
remotely. when unwanted software on an internet browser alters the activity of
 Synchronous - Synchronous collaborative technologies, the browser. Internet browsers serve as the "window" to the internet,
like Zoom and Slack, enable real-time interaction for and people use them to search for information and either view it or
effective teamwork, allowing immediate responses and interact with it.
active engagement. Keylogger - a form of malware or hardware that keeps track of and
Asynchronous - Asynchronous collaboration technology, records your keystrokes as you type
Computer security also known as cybersecurity or IT security, refers
on the other hand, caters to a different aspect of effective
to the practice of protecting computer systems, networks, and data
teamwork. It recognizes that not all work can happen in real
from unauthorized access, use, disclosure, disruption, modification, or
time and provides valuable solutions for scenarios where
destruction. It encompasses a range of technologies, processes, and
immediate interaction isn't essential.
practices designed to defend against cyberattacks, data breaches, and
Social networks are websites and apps that allow users and
other security threats.
organizations to connect, communicate, share information and form
Firewall – An important solution for computer security A firewall is a
relationships. People can connect with others in the same area,
network security system, either hardware of software-based, that
families, friends, and those with the same interests.
controls incoming and outgoing network traffic based on a set of rules.
 Brand awareness. Social networking enables companies to
An internet firewall is a device or software that is designed to protect
reach out to new and existing clients. This helps to make
your computer from data and viruses that you do not want. A firewall
brands more relatable and promotes brand awareness.
is so called because of the real firewall used to secure buildings. A
Instant reachability. By erasing the physical and spatial
physical firewall is a set of doors that closes in a building so as to
boundaries between people, social networking websites can
contain a fire to one area, preventing the entire building from being
provide instant reachability.
destroyed.
Builds a following. Organizations and businesses can use
social networking to build a following and expand their
reach globally.
Business success. Positive reviews and comments generated
by customers on social networking platforms can help
improve business sales and profitability.
Virus: Computer virus are malicious that cause change to data and
files on a system. Virus can attack any part of the computer software.
WORMS A type of malware or malicious software that can replicate
itself rapidly and spread across devices within a network. A worm
consumes
Trojan Horse A Trojan horse or Trojan is a type of malware that is
often disguised as legitimate software. Trojans can be employed by
cyber-thieves and hackers trying to gain access to users' systems. Users
are typically tricked by some form of social engineering into loading
and executing Trojans on their systems.
SNOOPING - unauthorized access to another person's or company's
data
SPAMMING - Sending of bulk emails by identified or unidentified

You might also like