Professional Documents
Culture Documents
based
Threats
Security Threats and
Vulnerabilities
Group 2
CEIT-37-703A
ITP410
Evangelista, Erika S.
Fabula, Mauren Fiel F.
Fuentes, Vinz Jayson A.
Hernandez, Jon Rhem Ax'l B.
Magpili, Emily
Morales, Jamaica 0.
Rellores, Kenneth S.
SOFTWARE-BASED THREATS
How it attacks:
How it attacks:
How it attacks:
Philip R. Durachinsky, 28
years old from North Royalton,
Ohio has been indicted due to
spying. Prosecutors revealed that
Durachinsky created and installed
a malware called “Fruitfly ” on
thousands of people for 14 years
from 2003 to January 20, 2017.
● TWITTER PHISHING ATTACK
● Avoid opening any documents that are not from a sender you know and trust. If any of your
programs begin behaving oddly, run a scan using your anti-virus software immediately.
● Most antivirus software detects adware and labels it as “potentially unwanted applications”.
You can then authorize the adware or choose to remove it.
● Most computers come with embedded security features including a firewall. This prevents
unknown programs and processes from accessing the system but is not a replacement for
anti-virus software.
Security Tips
● Don't click on links within pop-up windows
● Never click "Agree" or "OK" to close a window that you suspect might be spyware. Instead, click
the red "x" in the corner of the window or press Alt + F4 on your keyboard to close a window.
● Be wary of free downloadable software
● Read all security warnings, license agreements, and privacy statements that are associated
with any software that you download.