This document discusses online safety and security risks such as email spam, email spoofing, and Trojan horses. Email spam refers to unsolicited commercial emails sent in bulk to multiple recipients. Email spoofing deceitfully changes the sender's email address to appear to come from someone known to the recipient. A Trojan horse is a type of malicious software that disguises itself as a legitimate program to gain access to a user's device without their consent in order to perform hidden, unwanted actions. The document encourages readers to be aware of these online dangers and take necessary precautions to stay safe.
This document discusses online safety and security risks such as email spam, email spoofing, and Trojan horses. Email spam refers to unsolicited commercial emails sent in bulk to multiple recipients. Email spoofing deceitfully changes the sender's email address to appear to come from someone known to the recipient. A Trojan horse is a type of malicious software that disguises itself as a legitimate program to gain access to a user's device without their consent in order to perform hidden, unwanted actions. The document encourages readers to be aware of these online dangers and take necessary precautions to stay safe.
This document discusses online safety and security risks such as email spam, email spoofing, and Trojan horses. Email spam refers to unsolicited commercial emails sent in bulk to multiple recipients. Email spoofing deceitfully changes the sender's email address to appear to come from someone known to the recipient. A Trojan horse is a type of malicious software that disguises itself as a legitimate program to gain access to a user's device without their consent in order to perform hidden, unwanted actions. The document encourages readers to be aware of these online dangers and take necessary precautions to stay safe.
ETHICS ONLINE SAFETY How safe are you? DANGERS ON THE INTERNET EMAIL SPAM
Also known as junk email, it is usually
unsolicited commercial email sent from one source with identical message sent to multiple recipients. EMAIL SPOOFING It refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know. Trojan Horse
This is a form of a malicious software fronting
to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. Example: https://www.youtube.com/watch?v=ft-iLTsHJAo THANK YOU !