You are on page 1of 29

GOOD DAY!

Ayesha Allian-Schuck

EMPOWERMENT TECHNOLOGIES
DANGERS ON THE INTERNET

Email Spam
• AKA Junk mail
• Usually unsolicited commercial email sent from an unknown
source with identical message sent to multiple recipients.
• Usually not dangerous but can be time and space consuming.
• Dangerous ones can carry viruses and other malicious software
(Malware)
SITUATIONAL ANALYSIS

What is the best way to get rid


of JUNK MAILS?
DANGERS ON THE INTERNET

Email Spoofing
• It is a deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different
source which is usually someone you know.
• Email spoofing is usually used by spammers to hide the origin of the
spam.
SITUATIONAL ANALYSIS

How would you know if


someone is spoofing you?
DANGERS ON THE INTERNET

Phishing
• It is a deceitful practice of trying to get confidential information
such as passwords and usernames, and credit card details by
making it appear as if it comes from a trustworthy source.
• It is usually done through emails or using popular entity such as
Microsoft, Yahoo, Google, Amazon, and financial institutions.
SITUATIONAL ANALYSIS

How would you know if


someone is phishing you?
DANGERS ON THE INTERNET

Pharming
• This is a dangerous hacker attack on a website which directs all
traffic to that website to another fictitious website.
• The main objective is to obtain username and passwords, as well
as credit cards ad financial information, and use these to steal
their money electronically or use the credit cards of the victims.
• It is a major concern of many online banking and electronic
commerce transactions.
SITUATIONAL ANALYSIS

How would you know if


someone is trying to pharm
you?
DANGERS ON THE INTERNET

Spyware
• A computer program that is installed covertly on a personal
computer to collect information or even take control over the
computer without the knowledge of the user.
• It can monitor and collect information about the user’s internet habits
and practices.
• It can also affect the performance and setting of the computer.
SITUATIONAL ANALYSIS

What can we do to prevent


installing a spyware?
DANGERS ON THE INTERNET

Computer Worm
• It is a dangerous computer program that replicates itself through
a network.
• Some worms delete files, others disrupt the network function.
• It is usually spread through email and running of attachments from
suspicious sources.
• It spreads by exploiting weaknesses in operating systems (but
BLESS OS updates!)
SITUATIONAL ANALYSIS

How do we know it is a worm-


infected file?
DANGERS ON THE INTERNET

Trojan Horse
• A malware fronting to perform a good task, but covertly performs
undesirable function with the intention of entering the computer
without the user’s consent.
• It can disable the computer’s defenses, opening it to unauthorized
entry. It can erase data, can corrupt files, allow access to computer,
and
SITUATIONAL ANALYSIS

How do we know it is a trojan


horse-infected file?
DANGERS ON THE INTERNET

Computer Virus
• It is a program that duplicates itself and then infects the
computer. It spreads like a biological virus.
• It can be transferred by the use of removable storage media devices.
• Damages may be mild to severe.
SITUATIONAL ANALYSIS

How do we know it is a virus-


infected file?
DANGERS ON THE INTERNET

Hacker
• This is a person who is able to enter and control other people’s
computer without authorization.
• Usually vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
• Firewalls are able to prevent entry by hackers.
SITUATIONAL ANALYSIS

How do we know you are being


hacked?
SITUATIONAL ANALYSIS

What other dangers can we


encounter in the internet?

You might also like