Professional Documents
Culture Documents
Internet robots, they can use the vulnerabilities and outdated software in your
system to infect it while you're casually surfing the web. They can be delivered by
Trojans or questionable software you get tricked into downloading (like rogue antivirus
programs).
Spyware is one of the most common threats to internet users. Once installed,
it monitors internet activity, tracks login credentials and spies on sensitive
information. The primary goal of spyware is usually to obtain credit card numbers,
banking information and passwords.
The primary difference between a virus and a worm is that viruses must be triggered
by the activation of their host; whereas worms are stand-alone malicious programs
that can self-replicate and propagate independently as soon as they have breached the
system.
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate
but can take control of your computer. A Trojan is designed to damage, disrupt, steal,
or in general inflict some other harmful action on your data or network. A Trojan acts like
a bona fide application or file to trick you.
Ransomware is a type of malicious software (malware) that threatens to publish or blocks
access to data or a computer system, usually by encrypting it, until the victim pays a ransom
fee to the attacker. In many cases, the ransom demand comes with a deadline.
Spam. The fact that most of our emails accounts come with a 'Spam' or 'Junk' folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these foldersSpam. The fact that most of our emails accounts come with
a 'Spam' or 'Junk' folder insinuates that spam emails are a huge issue, with more than
50% of emails being syphoned into these folders
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an
individual, group, or organization. It may include false accusations, defamation, slander
and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for
sex, doxing, or blackmail.
Cyberbullying can range from embarrassing or cruel online posts or digital pictures,
to online threats, harassment, and negative comments, to stalking
Spoofing is often the way a bad actor gains access in order to execute a
larger cyber attack such as an advanced persistent threat or a man-in-the-middle
attack
ST. MARY’S COLLEGE OF CATBALOGAN
DEL ROSARIO STREET CORNER MABINI AVENUE
CATBALOGAN CITY, SAMAR
PROJECT IN
KUMUNIKASYON
SUBMITTED BY:
VANRICK JOHN G ARINO
11 STEM-CHARITY
SUBMITTED TO:
MR. FLORENCE VERZOSA
Teacher