Professional Documents
Culture Documents
websites.
Online Safety and Security Worm- Worms are spread via software
vulnerabilities or phishing attacks. Once a
- The Internet, truly, is a powerful tool. It can
worm has installed itself into your
be used to promote your business, gain new
computer’s memory, it starts to infect the
friends, and stay in touch with the old ones.
whole machine and in some cases… your
- It is also a source of entertainment. But like
whole network.
most things in this world, there is always
Depending on the type of worm and your
“another side of the coin.” The Internet is
security measures, they can do serious
one of the most dangerous places,
damage. These parasitic nasties can…
especially if you do not know what you are
- Modify and delete files
doing.
- Inject malicious software onto computers
- Replicate themselves over and over to
Internet Threats: deplete system resources
- Steal your data
1. Malware – stands for malicious software,
- Install a convenient backdoor for hackers
software that is specifically designed
to disrupt, damage, or gain unauthorized
Types of Worm:
access to a computer system.
Email worms - Email worms work by
Types: Virus, Worm, Trojan, Spyware, Adware creating and sending outbound
messages to all the addresses in a
user's contact list.
Virus- Unlike worms, viruses need an File-sharing worms - File-sharing
already-infected active operating system or worms copy themselves into shared
program to work. Viruses are typically folders and spread through peer-to-
attached to an executable file or a word peer file-sharing networks
document. Internet worms - Some computer
- Most people are probably aware that a .exe worms specifically target popular
file extension could lead to issues if it’s not websites with poor security.
from a trusted source.
Don’t spam.
- Please don’t take advantage of your
connection with the other students in your
online classroom to forward emails and
links regarding your political/spiritual
beliefs or to sell your services.