Empowerment Technology: Dangers in Internet

Ace your homework & exams now with Quizwiz!

EMAIL SPAM

AKA "Junk Mail" Unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. It carries viruses or MALWARE (Malicious Software)

COMPUTER WORM

Dangerous computer program that replicates itself Some worms deletes files, others disrupt the network function Spread email from a suspicious source

EMAIL SPOOFING

Deceitful email practice in which the sender address is change Usually used by spammers to hide the origin of the spam

PHISHING

Deceitful practice of trying to get confidential information by making it appear as if it comes from a trustworthy source Usually done through emails or by just using the popular entities such as Microsoft, Google, Yahoo, Amazon or Financial Institutions

PHARMING

Directs all the traffic to a website to another fictitious website MAIN OBJECTIVE is get the personal information as well as credit cards ad financial information Use to steal identity and money

COMPUTER VIRUS

Duplicates itself and the infects the computer "biological virus" Virus can be mild or severe. Transferable thru: Internet storage devices sharing files/apps

SPYWARE

Installed covertly on a personal computer to collect information or even take control over the computer WITHOUT the knowledge of the user Monitors users internet habits and practices. Affects the performance of the computer and its setting

TROJAN HORSE

Malware fronting to perform a good task Performs undesirable function with the intention od entering the computer without the user's consent Disables the computer's defenses It corrupts files

Anti-Virus

To prevent Viruses


Related study sets

ATI Professional Nursing Practice

View Set

CSC 223 - Data Structures & Algorithms // Concept Final Review

View Set

Chapter 7: Managing Files (Review Questions)

View Set

WGU Principles of Psychology, D167

View Set