You are on page 1of 8

1.

Phishing is a type of social engineering attack often used to steal user data,


including login credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening an email, instant
message, or text message.

Pharming, a portmanteau of the words "phishing" and "farming", is an online scam


similar to phishing, where a website's traffic is manipulated, and confidential
information is stolen. In essence, it is the criminal act of producing a fake website and
then redirecting users to it.
Internet scam is the use of Internet services or software with Internet access to
defraud victims or to otherwise take advantage of them.

Internet robots, they can use the vulnerabilities and outdated software in your
system to infect it while you're casually surfing the web. They can be delivered by
Trojans or questionable software you get tricked into downloading (like rogue antivirus
programs).

As software designed to interfere with a computer's normal functioning, malware is a


blanket term for viruses, trojans, and other destructive computer programs threat
actors use to infect systems and networks in order to gain access to sensitive
information.
Adware (or advertising software) is the term used for various pop-up advertisements
that show up on your computer or mobile device. Adware has the potential to become
malicious and harm your device by slowing it down, hijacking your browser and
installing viruses and/or spyware.

Spyware is one of the most common threats to internet users. Once installed,
it monitors internet activity, tracks login credentials and spies on sensitive
information. The primary goal of spyware is usually to obtain credit card numbers,
banking information and passwords.
The primary difference between a virus and a worm is that viruses must be triggered
by the activation of their host; whereas worms are stand-alone malicious programs
that can self-replicate and propagate independently as soon as they have breached the
system.

A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate
but can take control of your computer. A Trojan is designed to damage, disrupt, steal,
or in general inflict some other harmful action on your data or network. A Trojan acts like
a bona fide application or file to trick you.
Ransomware is a type of malicious software (malware) that threatens to publish or blocks
access to data or a computer system, usually by encrypting it, until the victim pays a ransom
fee to the attacker. In many cases, the ransom demand comes with a deadline.

Spam. The fact that most of our emails accounts come with a 'Spam' or 'Junk' folder
insinuates that spam emails are a huge issue, with more than 50% of emails being
syphoned into these foldersSpam. The fact that most of our emails accounts come with
a 'Spam' or 'Junk' folder insinuates that spam emails are a huge issue, with more than
50% of emails being syphoned into these folders

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an
individual, group, or organization. It may include false accusations, defamation, slander
and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for
sex, doxing, or blackmail.
Cyberbullying can range from embarrassing or cruel online posts or digital pictures,
to online threats, harassment, and negative comments, to stalking 

Spoofing is often the way a bad actor gains access in order to execute a
larger cyber attack such as an advanced persistent threat or a man-in-the-middle
attack 
ST. MARY’S COLLEGE OF CATBALOGAN
DEL ROSARIO STREET CORNER MABINI AVENUE
CATBALOGAN CITY, SAMAR

PROJECT IN
KUMUNIKASYON

SUBMITTED BY:
VANRICK JOHN G ARINO
11 STEM-CHARITY

SUBMITTED TO:
MR. FLORENCE VERZOSA
Teacher

You might also like