Professional Documents
Culture Documents
Security and data protection
Security and data protection
B I U
Grace of Shekinah School
Welcome to
TLE 9
OPENING
PRAYER
Let's bow our heads and feel the
presence of our Lord.
File Edit Format View SIR MARK ROBERT DE JESUS’S CLASS
Security and
data
protection
According to the Philippines’
Republic act No. 10175
or the cybercrime prevention act of 2012
● Cybersecurity is the collection of
tools, policies, actions,
practices, and technologies that
can be used to protect the cyber
environment.
According to the Philippines’
Republic act No. 10175
or the cybercrime prevention act of 2012,
Malware
What is Malware?
Malware, short for Malicious software, is
a program that do unwanted actions or
damage an operating system in a seamless
manner, with the intent of harming the
computer or user. it is a product of
cybercrimes, particularly by data
interference and system interference.
The Following are the different types
of Malware
• Virus
•Worms
•Trojan horse or Trojan
•Spyware
•adware
Virus
Virus is a program written to
enter to your computer and
damage/alter your files/data. A
virus might corrupt or delete
data on your computer. Viruses
can also replicate themselves.
Worms
Worms can be transmitted via software
vulnerabilities. Or computer worms could
arrive as attachments in spam emails or
instant messages (IMs). Once opened, these
files could provide a link to a malicious
website or automatically download the
computer worm. Once it’s installed, the worm
silently goes to work and infects the machine
without the user’s knowledge.
Worms
Sometimes a computer worm’s purpose is only
to make copies of itself over and over —
depleting system resources, such as hard
drive space or bandwidth, by overloading a
shared network. In addition to wreaking havoc
on a computer’s resources, worms can also
steal data, install a backdoor, and allow a
hacker to gain control over a computer and
its system settings.
Trojan Horse or Trojan
A Trojan acts like a legit
application or file to trick you.
It seeks to deceive you into
loading and executing the malware
on your device. Once installed, a
Trojan can perform the action it
was designed for.
Trojan Horse or Trojan
A Trojan is sometimes called a
Trojan virus or a Trojan horse
virus, but that’s a misnomer.
Viruses can execute and replicate
themselves. A Trojan cannot. A
user has to execute Trojans.
Spyware
Spyware is loosely defined as malicious
software designed to enter your computer
device, gather data about you, and forward it
to a third-party without your consent.
Spyware can also refer to legitimate software
that monitors your data for commercial
purposes like advertising. However, malicious
spyware is explicitly used to profit from
stolen data.
Spyware
Whether legitimate or based in
fraud, spyware’s surveillance
activity leaves you open to data
breaches and misuse of your private
data. Spyware also affects network
and device performance, slowing down
daily user activities.
Adware
Adware is software that
displays unwanted (and
sometimes irritating) pop-up
adverts which can appear on
your computer or mobile
device.
Adware
Adware typically ends up on a user’s device through
one of two ways:
● You might install a free computer program or app
without necessarily realizing that it contains
additional software that contains adware.
Best Practices
against Cybercrime
and Malware
Best Practices against Cybercrime and malware
Thankyou Class!