likelihood of anyone being exposed to a
danger or adverse situation
while using the internet.
Internetrisk
It happens when someone intentionally abused, harass, and mistreated by other person using
electronic communication.
Cyberbullying
It is a crime of stealing personal information for the purpose of assuming that person’s name or
identity to make any form of transactions.
Identity Theft
A criminal practice where electronic communication is used to stalk or harass individual
or group
Cyber stalking
The act of sending sexually explicit text messages, images, and videos.
Sexting
is a threat that makes use
of the World Wide
Web to disperse,
conceal, and update
itself to facilitate
cybercrime
Internet threat
alsoknownasmalicioussoftware. It is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
Malware
malicious program that replicate itself by copying itself to another program
Virus
malicious program that disguised as legitimate program that user will accept and use but take control of your computer
Trojan
malicious program that copy’s itself and spreads to other computers
Worm
malicious program that gathers information from victim’s computer and send it back to the hacker
Spyware
unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them
Adware
program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer
or device.
Keylogger
collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware
Botnet
software tools used by hackers to gain control over a computer on a network without being expo
Rootkit
ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
Ransomware
Also known as junkemail or unwanted email send by advertiser or bot. It can be used to send malware.
Spam
A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.
Phishing
A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes,
identity thief and others
Cybercrime
the law that deals with all forms of cybercrime.
Cybercrimelaw
t is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of
an online society through social media, you are called netizen. And in
interacting with other netizen online, we need to maintain good behavior which
is acceptable to others in online community.