Professional Documents
Culture Documents
Emtech
Emtech
Home
Email Spoofing
This refers to deceitful email practice
in which the sender address is
changed, to that it would appear to
have come from a different source
usually someone you know
Home
Phishing
This is a deceitful practice of trying to get
confidential information such as password and
user names, and credit card details but making it
appear as if it comes from a trustworthy source
Home
Pharming
This is a dangerous hacker attack on a website
which directs an traffic to that website to
another fictitious websites
Home
Spyware
This is a computer program that is installed
covertly on a personal computer to called
information or even take control over the
computer without the knowledge of the user
Home
Computer worm
• This is a dangerous computer program that
replicates itself through a network. Some
worms delete files, other disrupts the
networking function and still, other send junk
mail from infected computer
Home
Computer Virus
This is a program that duplicate itself and then
infects the computer. It spreads like a real
biological virus, where in it attaches itself to a
host program and infect other computer if it is
received by a computer through the internet
Home
Trojan horse
This is a form of a malicious software (malware)
fronting to perform a good task, but covertly
performs undesirable function with the
intention of entering the computer without
user’s consent
Home
Hacker
This is a person who is able to enter and control
other peoples computer without authoring
Home