W3

Cards (33)

  • Dangers on the Internet
    • Email Spam
    • Email Spoofing
    • Phishing
    • Pharming
    • Spyware
    • Trojan Horse
  • Email Spam
    • AKA Junk mail
    • Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients
    • Usually not dangerous but can be time and space consuming
    • Dangerous ones can carry viruses and other malicious software (Malware)
  • Best way to get rid of Junk Mails
    Not specified
  • Email Spoofing
    • Deceitful email practice where the sender address is changed to appear from a different source, usually someone you know
    • Used by spammers to hide the origin of the spam
  • How to know if someone is spoofing you

    Not specified
  • Phishing
    • Deceitful practice of trying to get confidential information by making it appear from a trustworthy source
    • Usually done through emails or using popular entities such as Microsoft, Yahoo, Google, Amazon, and financial institutions
  • How to know if someone is phishing you
    Not specified
  • Pharming
    • Dangerous hacker attack on a website directing traffic to a fictitious website
    • Objective is to obtain sensitive information like usernames, passwords, and financial details
    • Major concern for online banking and electronic commerce transactions
  • How to know if someone is trying to pharm you
    Not specified
  • Spyware
    • Covertly installed computer program to collect information or take control over the computer without user's knowledge
    • Can monitor and collect information about the user's internet habits and practices
    • Affects computer performance and settings
  • How to prevent installing spyware
    Not specified
  • Trojan Horse
    • Malware pretending to perform a good task but covertly performs undesirable functions
    • Intention is to enter the computer without user's consent
    • Can disable computer's defenses, erase data, corrupt files, allow unauthorized access
  • How to know if a file is trojan horse-infected
    Not specified
  • Filipino Onel de Guzman: 'He unleashed the Love Bug computer worm to steal passwords so he could access the internet without paying'
  • Victims received an email attachment entitled LOVE-LETTER-FOR-YOU containing malicious code that would overwrite files, steal passwords, and automatically send copies of itself to all contacts in the victim's Microsoft Outlook address book
  • Victims received an email attachment entitled LOVE-LETTER-FOR-YOU
  • The email attachment contained malicious code that would overwrite files, steal passwords, and automatically send copies of itself to all contacts in the victim's Microsoft Outlook address book
  • Within 24 hours, the malicious email attachment was causing major problems across the globe, reportedly infecting 45 million machines
  • White, G. (2020, May 3): 'Love bug's creator tracked down to repair shop in Manila'
  • Computer Worm
  • Computer Worm characteristics
    • Replicates itself through a network
    • Some worms delete files, others disrupt the network function
    • Usually spread through email and running of attachments from suspicious sources
    • Spreads by exploiting weaknesses in operating systems
  • Computer Virus
  • Computer Virus characteristics
    • Duplicates itself and infects the computer
    • Spreads like a biological virus
    • Can be transferred by the use of removable storage media devices
    • Damages may be mild to severe
  • Hacker
  • Hacker characteristics
    • Able to enter and control other people’s computer without authorization
    • Vandalizes victims’ websites, steals personal information, obtains intellectual property, performs credit card fraud
    • Firewalls can prevent entry by hackers
  • Copyright
  • Intellectual property (IP) is a category of property that includes intangible creations of the human intellect
  • Types of intellectual property
    • Copyrights
    • Patents
    • Trademarks
    • Trade secrets
  • Copyright infringement includes the unauthorized or unlicensed copying of a work subject to copyright
  • Plagiarism is using someone else's work or ideas without giving proper credit
  • Fair Use refers to the author’s sole right and the author’s limitation to an original work, which may include criticism, researching, commentary, news broadcasting, scholarship, search engines, and library archiving
  • Evaluating Information
  • THANK YOU!