Professional Documents
Culture Documents
EMPOWERMENT
TECHNOLOGIES
Mr. Bryl John Lawrence Z. Villamar
Subject Teacher
REVIEW
3
2
TIPS ON HOW
3 TO BE SAFE
4 ONLINE
5
8
1 Do not share your password with anyone
Botnet
Trojan Horse
Rootkit
Worm
Ransomware
Spyware
Adware
INTERNET Types of Malware
THREATS VIRUS
A malicious program
that replicate itself by
copying itself to
another program
TROJ
INTERNET Types of Malware
THREATS TROJAN HORSE
A malicious program
that disguised as
legitimate program that
user will accept and use
but take control of your
computer
WORM
INTERNET Types of Malware
THREATS WORM
Malicious program
that copy’s itself and
spreads to other
computers.
SPYW
INTERNET Types of Malware
THREATS SPYWARE
A malicious program
that gathers
information from
victim’s computer and
send it back to the
backer. ADWA
INTERNET Types of Malware
THREATS ADWARE
An unwanted
advertisement that will
pop-up several times on
victim’s computer then
behave abnormally and
tedious to close them.
KEYLO
INTERNET Types of Malware
THREATS KEYLOGGER
A program that runs in the
background and steals user
credentials and confidential
information and send back
to hack by recording every
keystroke that a user makes
on their computer or device.
BOTNE
INTERNET Types of Malware
THREATS BOTNET
- A collection of infected
internet – connected devices
such as PC and mobile
phone that are controlled by
a common type of malware.
- Robot Network
ROOT
INTERNET Types of Malware
THREATS ROOTKIT
A software tools used
by hackers to gain
control over a
computer on a network
without being exposed.
RANSO
INTERNET Types of Malware
THREATS RANSOMWARE
A ransom virus that block
the user from accessing the
programs or files and
demands to pay the ransom
through online method for
the removal of the virus.
INTERNET
THREATS SPAM
Also known as junk
email or unwanted
send by advertiser or
bot. It can be used to
send malware.
INTERNET PHISHING
THREATS
A cyberattack method
using deceptive
emails and websites
to acquiring sensitive
personal information.
INTERNET PHARMING
THREATS
A portmanteau of the words
"phishing" and "farming", is an online
scam like phishing, where a
website's traffic is manipulated, and
confidential information is stolen. In
essence, it is the criminal act of
producing a fake website and then
redirecting users to it.
INTERNET CYBERCRIME
THREATS
A crime in which computer
is used as object and tool in
committing a crime such
hacking, phishing,
spamming, child
pornography, libel, hate
crimes, identify thief and
INTERNET INTERNET SCAM
THREATS A type of scam that misleads the
user in many ways attempting to
take lead of them. The purpose
of this scam is to cheat to the
target of their personal property
directly rather than private
information through fabricated
promises, confidence tricks, and
many more.
NETIQUETTE
It is an etiquette applied
online that shows proper
manner and behavior. If
you are a member of an
online society through
social media, you are
called netizen.
THE CORE RULES OF NETIQUETTE
Remember the human
Adhere to the same standards of behavior online that you
follow in real life.
Know where you are in cyberspace.
Respect other people’s time and bandwidth.
Make yourself look good online.
Share expert knowledge.
Help keep flame wars under control.
Respect other people’s privacy.
Don’t abuse your power.
Be forgiving of other people’s mistakes.
ACTIVITY
Make a poster
with a theme
“THINK
BEFORE YOU
CLICK”.
RUBRIC
CRITERIA 4 3 2 1
Students uses their Students uses most of Students use some of Student does not use
time to work their time to work their time to work their time to work
USE OF TIME productively and productively and productively and productively and
efficiently. efficiently efficiently efficiently. Student is
frequently off task.
Pictures and graphics Most pictures and Few of the pictures The student’s pictures
PICTURES/GRAPHICS are clear and relevant graphics are clear and and graphics are clear are not clear and
relevant and relevant relevant
All of the required Most of the required Few of the required Missing most or all of
elements are clearly elements are clearly elements are clearly the required
REQUIRED ELEMENTS visible, organize, and visible, organize, and visible, organize, and elements.
well placed. well placed. well placed. May be
missing elements.