The document discusses online safety and security. It provides tips for being secure, respectful, safe, responsible, and legal when online. It also discusses common internet threats like malware, spam, phishing, botnets, and denial of service attacks. Malware includes viruses, worms, trojans, spyware and adware that can harm computers. Phishing and botnets are used to steal personal information. Denial of service attacks disrupt access to internet services. The document emphasizes the importance of cybersecurity.
The document discusses online safety and security. It provides tips for being secure, respectful, safe, responsible, and legal when online. It also discusses common internet threats like malware, spam, phishing, botnets, and denial of service attacks. Malware includes viruses, worms, trojans, spyware and adware that can harm computers. Phishing and botnets are used to steal personal information. Denial of service attacks disrupt access to internet services. The document emphasizes the importance of cybersecurity.
The document discusses online safety and security. It provides tips for being secure, respectful, safe, responsible, and legal when online. It also discusses common internet threats like malware, spam, phishing, botnets, and denial of service attacks. Malware includes viruses, worms, trojans, spyware and adware that can harm computers. Phishing and botnets are used to steal personal information. Denial of service attacks disrupt access to internet services. The document emphasizes the importance of cybersecurity.
Are you safe and secured online? ONLINE SAFETY Always be secure 1. Keep your passwords to yourself 2. Should always log out or log off your account. Be respectful 1. Always be polite and use appropriate language 2. Do not look at anyone else’s files without their permission 3. Cyber bullying unacceptable Be Safe 1. Do not share personal information in the social media
2. Be aware of emails that ask for personal
information 3. Never meet up with anyone that you have only met online. Be responsible 1. Keep focus only on the things you are working on 2. Take good care of the equipment you use 3. Use your device in school only at agreed time. Be legal 1. Copy/upload publish materials that are appropriate 2. Take images or video of other people with their full permission 3. Everything you do or upload will be there forever. Security Anti Virus INTERNET THREATS INTERNET THREATS 1. MALWARE 2. SPAM 3. PHISHING 4. BOTNET 5. DENIAL OF SERVICE ATTACK 1. MALWARE
malicious software, is any program or file that is
harmful to a computer user. Types of Malware 1. Virus 2. Worm 3. Trojan 4. Spyware 5. Adware Virus A malicious program designed to replicate itself and transfer from one computer to another. Example: Internet Local Network Cd’s Flashdrive Worm A malicious program that transfers from one computer to another by any types of means Trojan A malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. Spyware A program that runs in the background without you knowing it. It has the ability to monitor what you currently doing and typing through keylogging. Adware A program designed to send you advertisements, mostly as pop-ups. 2. SPAM An unwanted email from bots or advertisers. It can be used to send malware. 3. PHISHING An unwanted acquisition of sensitive personal information like passwords and credit card details. 4. BOTNET Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. 5. DENIAL OF SERVICE ATTACK Disrupts computer access to internet services A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources. O Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim's resources and make it difficult or impossible for legitimate users to access them.