Internet Threats

Cards (15)

  • MALWARE
    Malicious software
  • VIRUS
    • A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage
  • WORM
    • A malicious program that transfers from one computer to another by any type of means. It uses a computer network to spread itself.
  • ILOVEYOU worm
    Also known as Love Bug Worm, a computer worm that infected over ten million Windows personal computers on and after 5 May 2000
  • TROJAN
    • A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
  • ROGUE SECURITY SOFTWARE
    • Tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
  • SPYWARE
    • A program that runs in the background without you knowing it ("spy"). It has the ability to monitor what you are currently doing and typing through keylogging.
  • KEYLOGGERS
    • Used to record the keystrokes done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using keyboard.
  • Methods of recording typing
    • Hardware keylogger - Device attached to keyboard
    • Software keylogger - Programs runs on computer
  • ADWARE
    • A program designed to send you advertisements, mostly as pop-ups
  • SPAM
    • Unwanted email mostly from bots or advertisers. It can be used to send malware.
  • PHISHING
    • Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website.
  • PHARMING
    • A more complicated way of phishing where it exploits the DNS system.
  • HACKING
    The process by which cyber criminals gain access to your computer.
  • ANTIVIRUS
    • Dedicated software that helps in detecting cyber threats such as malware, spyware, and phishing.