Empowerment Technology: Dangers in Internet
EMAIL SPAM
AKA "Junk Mail" Unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. It carries viruses or MALWARE (Malicious Software)
COMPUTER WORM
Dangerous computer program that replicates itself Some worms deletes files, others disrupt the network function Spread email from a suspicious source
EMAIL SPOOFING
Deceitful email practice in which the sender address is change Usually used by spammers to hide the origin of the spam
PHISHING
Deceitful practice of trying to get confidential information by making it appear as if it comes from a trustworthy source Usually done through emails or by just using the popular entities such as Microsoft, Google, Yahoo, Amazon or Financial Institutions
PHARMING
Directs all the traffic to a website to another fictitious website MAIN OBJECTIVE is get the personal information as well as credit cards ad financial information Use to steal identity and money
COMPUTER VIRUS
Duplicates itself and the infects the computer "biological virus" Virus can be mild or severe. Transferable thru: Internet storage devices sharing files/apps
SPYWARE
Installed covertly on a personal computer to collect information or even take control over the computer WITHOUT the knowledge of the user Monitors users internet habits and practices. Affects the performance of the computer and its setting
TROJAN HORSE
Malware fronting to perform a good task Performs undesirable function with the intention od entering the computer without the user's consent Disables the computer's defenses It corrupts files
Anti-Virus
To prevent Viruses