The Internet of Things (IoT) is a network of hardware, sensors, and sources.
Damage caused by spamming are:
software connected via the internet. The IoT enables increasingly Phishing - Usually ‘phishing’ using a trusted institution name so we efficient transmission of data, not only between devices and humans, want to open it. but among devices as well. The IoT is used in many different sectors, Spear phishing (targets specific people or departments) ranging from retail, healthcare, and logistics to government, finance, Whale phishing (targets important people like CEOs) and construction. SMiShing (phishing via text messages) and vishing (voice phishing that takes place over the phone, usually through A smart classroom is an educational space that is equipped impersonation). with technology to enhance the teaching and learning Pharming - Make us to enter a site that cheat. Then the “thieves” include software that is “evil” into our computer. Then make us always experience. to the wrong sites, although we have entered the correct address Smart library can include digital catalogs and databases, Cookies - A small piece of data sent from a website and stored in the automated checkout systems, self-service kiosks, RFID web browser of the user. These cookies help tagging for inventory management, and digital lending of e- track user’s browsing sessions and load information faster, but create books and other electronic resources. some security and privacyconcerns as well. Smart Learner IoT in education aims to create smart SPYWARE - Spyware is designed to gather information about a learners by enabling personalized learning experiences person or organization without their knowledge or consent. It can track through technology and analytics. a user's internet browsing habits, record keystrokes, capture Convergence allows users to perform multiple tasks with just a single passwords, and collect other sensitive information. device, which saves time, offers convenience, conserves space, and ADWARE - Primarily focused on displaying unwanted can be less costly. advertisements on a user's computer. While adware can be annoying and intrusive, it is typically not as malicious as spyware. Adware may Portability refers to the ability of collaborative technology to be easily track some user information to display targeted ads, but its main goal moved or carried. is to generate revenue through advertising. Personalization in collaborative technology refers to the ability to RANSOMWARE - Ransomware is a type of malicious software that customize the technology to meet individual preferences and needs. encrypts your files or locks you out of your computer, and then Collaborative technology is a tool or software designed to facilitate demands a ransom payment in exchange for restoring access. working in groups and holding real-time meetings in the office and BROWSER & SEARCH HIJACKING - Browser hijacking occurs remotely. when unwanted software on an internet browser alters the activity of Synchronous - Synchronous collaborative technologies, the browser. Internet browsers serve as the "window" to the internet, like Zoom and Slack, enable real-time interaction for and people use them to search for information and either view it or effective teamwork, allowing immediate responses and interact with it. active engagement. Keylogger - a form of malware or hardware that keeps track of and Asynchronous - Asynchronous collaboration technology, records your keystrokes as you type Computer security also known as cybersecurity or IT security, refers on the other hand, caters to a different aspect of effective to the practice of protecting computer systems, networks, and data teamwork. It recognizes that not all work can happen in real from unauthorized access, use, disclosure, disruption, modification, or time and provides valuable solutions for scenarios where destruction. It encompasses a range of technologies, processes, and immediate interaction isn't essential. practices designed to defend against cyberattacks, data breaches, and Social networks are websites and apps that allow users and other security threats. organizations to connect, communicate, share information and form Firewall – An important solution for computer security A firewall is a relationships. People can connect with others in the same area, network security system, either hardware of software-based, that families, friends, and those with the same interests. controls incoming and outgoing network traffic based on a set of rules. Brand awareness. Social networking enables companies to An internet firewall is a device or software that is designed to protect reach out to new and existing clients. This helps to make your computer from data and viruses that you do not want. A firewall brands more relatable and promotes brand awareness. is so called because of the real firewall used to secure buildings. A Instant reachability. By erasing the physical and spatial physical firewall is a set of doors that closes in a building so as to boundaries between people, social networking websites can contain a fire to one area, preventing the entire building from being provide instant reachability. destroyed. Builds a following. Organizations and businesses can use social networking to build a following and expand their reach globally. Business success. Positive reviews and comments generated by customers on social networking platforms can help improve business sales and profitability. Virus: Computer virus are malicious that cause change to data and files on a system. Virus can attack any part of the computer software. WORMS A type of malware or malicious software that can replicate itself rapidly and spread across devices within a network. A worm consumes Trojan Horse A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. SNOOPING - unauthorized access to another person's or company's data SPAMMING - Sending of bulk emails by identified or unidentified