Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

INTERNET

THREATS
Part 01

IDENTIFICATION
1. What does
Malware stands
for?
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
2. A program that runs
in the background https://m.facebook.com/story.php?

without you knowing it


story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
3. A program
designed to send you
advertisement mostly
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332

as pop-ups
4. A malicious program that
transfers from one
computer to another by any
type of means. Often, it https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
uses a computer network to
spread itself.
5. A malicious program that is
disguised as a useful program
but once downloaded or
installed, leaves your PC
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=

unprotected and allows 100023312502332

hackers to get your


information
6. Unwanted email
mostly from bots or https://m.facebook.com/story.php?

advertisers. It can
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332

be used to send
malware
7. This is done by sending
you an email that will
direct the user to visit a
https://m.facebook.com/story.php?
website and be asked to
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
update his/her username,
password, credit card or
personal information
8. A more
complicated way
of phishing where
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332

it exploits the DNS


system
9. A malicious program
designed to replicate itself
and transfer from one
computer to another either
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=

through the internet and 100023312502332

local networks or data


storage like flash drives and
CDs
10. What does
DNS stands for?
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
Part 02

TRUE OR FALSE
Write INTERNET if it's TRUE and https://m.facebook.com/story.php?

write THREAT if it's FALSE.


story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
1.Trojan is a program that runs in the
background without you knowing it .It has
the ability to monitor what you are
currently doinghttps://m.facebook.com/story.php?
and typing through
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=

keylogging 100023312502332
2. Worm is a program designed to send you
advertisements, mostly as pop-ups

https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
3. Adware is an unwanted email mostly
from bots or advertisers. It can be used to
send malware.
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
4. Phishing is a more complicated way of
pharming where it exploits the DNS system.

https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
5. Keyloggers - used to record the keystroke
done by the users.

https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
6. Rogue security software tricks the user
into posing that it is a security software. It
asks the user to pay to improve his/her
security but inhttps://m.facebook.com/story.php?
reality, they are not
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
protected 100023312502332

at all.
7. The goal of PHISHING is to acquire
sensitive personal information like
passwords and credit card details.
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
8. Virus is a malicious program designed to
replicate itself and transfer from one
computer to another by any type of means.
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
9. Malware stands for malicious hardware

https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
10. The ILOVEYOU worm (Love Bug Worm)
ceeated by a Filipino is an example of
Phishing
https://m.facebook.com/story.php?
story_fbid=pfbid0jjkXnVjzQksJECzsB7DxodxpecLgVRyR68wM1WcEnSbAZw5c66Zpk1ATx52k3eKJl&id=
100023312502332
PART 01
1. Malicious Software
2. Spyware 9. Virus
3. Adware 10. Domain Name
4. Worm Service
5.Trojan
6. Spam
7. Phishing
8. Pharming
PART 02
1. Threat
2. Threat 9. Threat
3. Threat 10. Threat
4. Threat
5.Internet
6. Internet
7. Internet
8. Internet
THANK YOU

You might also like