Lormatet A. Sulsona: Prepared by
Lormatet A. Sulsona: Prepared by
Lormatet A. Sulsona: Prepared by
LORMATET A. SULSONA
What
happens in a
minute on
the Internet?
Netiquettes
Most Essential Learning Competencies (MELCs):
2. ADWARE
- designed to send you advertisements,
mostly as pop-ups.
3. TROJAN
- disguised as a useful program but once downloaded or
installed, leaves your PC unprotected.
4. VIRUS
- designed to replicate itself and transfer from one
computer to another either through the internet or data
storages.
5. WORMS
- transfers from one computer
to another by any type of means.
It often uses a computer network
to spread itself.
6. PHISHING
- acquires sensitive information
by sending you an email that will
direct the user to visit a website
and be asked to update his
information.
7. SPYWARE
- programs that runs in the
background without you knowing.
It has the ability to monitor
what you are currently doing.
8. KEYLOGGERS
- which are similar to spyware,
record a user's keyboard operations.
9. PHARMING
- is a more sophisticated form of
phishing that takes advantage of the
DNS system. Pharmers frequently
construct web pages that look like
those of a reputable company, such
as an online banking log-in page.
10. ROGUE SECURITY SOFTWARE
- This is a form of malicious
software and internet fraud that
misleads users into believing
there is a virus on their computer
and aims to convince them to pay
for a fake malware removal tool
that actually, installs malware on
their computer.
Rule 1: Remember the Human