Sunteți pe pagina 1din 10

EMAIL SPAM

Also known as junk email, it is usually


unsolicited commercial email sent from one
source with identical message sent to
multiple recipients.
SPAMMER
Is the term used to refer to a person ho
creates electronic spam.
EMAIL SPOOFING

 This refers to deceitful email practice in which the


sender address is change, so that it would appear to
have come from a different source usually someone
you know.
PHISHING

 This is deceitful practice of trying to get confidential


information such as passwords and usernames, and
credit card details by making it appear as if it comes
from trustworthy source.
PHARMING

 This is dangerous hacker attack on a website which directs all


traffic to that website to another fictitious website. The main
object of pharming is to obtain usernames and passwords, as
well as credit cards and financial information, and use these to
steal their money electronically or use the credit card of the
victims.
SPYWARE
 This is a computer program that is installed covertly on a
personal computer to collect information or even take control
over the computer without the knowledge of the user . A
spyware program would be able to monitor and collect
information about the user and his internet habits and practices.
COMPUTER WORM

 This is dangerous computer program that replicates itself


through a network. Some worms delete files, other disrupt the
network function and still, others send junk email from infected
computer. Computer worm usually spreads by exploiting
weaknesses in operating system, and manufacturers of this
software regularly send free updates to clients to prevent the
spread of the worms.
TROJAN HORSE

 This is a form of malicious software (malware) fronting to perform a


good task, but covertly performs undesirable function with the
intention of entering the computer without the user’s consent. Once
the malware is installed in the computer, Trojan horse can disable the
computer’s defenses opening it to unauthorized entry.
COMPUTER VIRUS

 This is a program that duplicates itself and then infects the


computer. It spreads like a real biological virus, wherein it
attaches itself to a host program and infect other computers if it
is received by a computer through the internet. The virus can
also be transferred by the use of removable storage media
such as diskette, CF, lash drives, memory cards, and others.
HACKER

 This is a person who is able to enter and control other people’s


computer without authorization. A hacker is able to enter
another’s computer , usually vandalizes the victim’s websites,
steals personal information , obtains intellectual property and
performs credit card fraud.
Technology is a useful servant but a
dangerous master..
-Christian Lous Lange

S-ar putea să vă placă și