Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Safety Security Ethics

Types of danger in the internet


Click Me!
Email Spam
Pharming Trojan Horse
Email Spoofing
Spyware Hacker
Phishing

Computer Worm Computer Virus


Email Spam
Also know as junk email, it is usually unsolicited
commercial email sent from one source with
identical message sent to multiple recipients

Home
Email Spoofing
This refers to deceitful email practice
in which the sender address is
changed, to that it would appear to
have come from a different source
usually someone you know

Home
Phishing
This is a deceitful practice of trying to get
confidential information such as password and
user names, and credit card details but making it
appear as if it comes from a trustworthy source

Home
Pharming
This is a dangerous hacker attack on a website
which directs an traffic to that website to
another fictitious websites

Home
Spyware
This is a computer program that is installed
covertly on a personal computer to called
information or even take control over the
computer without the knowledge of the user

Home
Computer worm
• This is a dangerous computer program that
replicates itself through a network. Some
worms delete files, other disrupts the
networking function and still, other send junk
mail from infected computer

Home
Computer Virus
This is a program that duplicate itself and then
infects the computer. It spreads like a real
biological virus, where in it attaches itself to a
host program and infect other computer if it is
received by a computer through the internet

Home
Trojan horse
This is a form of a malicious software (malware)
fronting to perform a good task, but covertly
performs undesirable function with the
intention of entering the computer without
user’s consent

Home
Hacker
This is a person who is able to enter and control
other peoples computer without authoring

Home

You might also like