Dangers on the Internet
Trojan Horse
A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user's consent.
Computer Worm
It is a dangerous computer program that replicates itself. It is usually spread through email and running of attachments from suspicious sources
Computer Virus
It is a program that duplicates itself and then infects the computer. It spreads like a biological virus. It can be transferred by the use of removable storage media devices.
Hacker
This is a person who is able to enter and control other people's computer without authorization.
Email Spam
Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients.
Spyware
can monitor and collect information about the user's internet habits and practices.
Pharming
dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
Email Spoofing
deceitful email practice in which the sender address is changed
Phishing
deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source
Pharming
exploit the Domain Name Service (DNS) system
Spyware
is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user.
Email spoofing
is usually used by spammers to hide the origin of the spam.
Pharming
main objective is to obtain username and passwords, as well as credit cards ad financial information, and use these to steal their money electronically
Junk mail
other term for email spam