0 evaluări0% au considerat acest document util (0 voturi)
40 vizualizări10 pagini
This document defines and describes various types of cyber threats including email spam, email spoofing, phishing, pharming, spyware, computer worms, Trojan horses, computer viruses, and hackers. Email spam refers to unsolicited commercial email sent in bulk. Email spoofing involves changing the sender address to appear from a different source. Phishing tries to obtain confidential information by appearing to come from a trustworthy source. Pharming hijacks traffic to a website to steal personal information. Spyware covertly collects user information. Computer worms self-replicate through networks and can delete files or disrupt systems. Trojan horses appear helpful but covertly perform unwanted actions. Computer viruses duplicate and spread to infect other devices. Hack
This document defines and describes various types of cyber threats including email spam, email spoofing, phishing, pharming, spyware, computer worms, Trojan horses, computer viruses, and hackers. Email spam refers to unsolicited commercial email sent in bulk. Email spoofing involves changing the sender address to appear from a different source. Phishing tries to obtain confidential information by appearing to come from a trustworthy source. Pharming hijacks traffic to a website to steal personal information. Spyware covertly collects user information. Computer worms self-replicate through networks and can delete files or disrupt systems. Trojan horses appear helpful but covertly perform unwanted actions. Computer viruses duplicate and spread to infect other devices. Hack
This document defines and describes various types of cyber threats including email spam, email spoofing, phishing, pharming, spyware, computer worms, Trojan horses, computer viruses, and hackers. Email spam refers to unsolicited commercial email sent in bulk. Email spoofing involves changing the sender address to appear from a different source. Phishing tries to obtain confidential information by appearing to come from a trustworthy source. Pharming hijacks traffic to a website to steal personal information. Spyware covertly collects user information. Computer worms self-replicate through networks and can delete files or disrupt systems. Trojan horses appear helpful but covertly perform unwanted actions. Computer viruses duplicate and spread to infect other devices. Hack
unsolicited commercial email sent from one source with identical message sent to multiple recipients. SPAMMER Is the term used to refer to a person ho creates electronic spam. EMAIL SPOOFING
This refers to deceitful email practice in which the
sender address is change, so that it would appear to have come from a different source usually someone you know. PHISHING
This is deceitful practice of trying to get confidential
information such as passwords and usernames, and credit card details by making it appear as if it comes from trustworthy source. PHARMING
This is dangerous hacker attack on a website which directs all
traffic to that website to another fictitious website. The main object of pharming is to obtain usernames and passwords, as well as credit cards and financial information, and use these to steal their money electronically or use the credit card of the victims. SPYWARE This is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user . A spyware program would be able to monitor and collect information about the user and his internet habits and practices. COMPUTER WORM
This is dangerous computer program that replicates itself
through a network. Some worms delete files, other disrupt the network function and still, others send junk email from infected computer. Computer worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software regularly send free updates to clients to prevent the spread of the worms. TROJAN HORSE
This is a form of malicious software (malware) fronting to perform a
good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. Once the malware is installed in the computer, Trojan horse can disable the computer’s defenses opening it to unauthorized entry. COMPUTER VIRUS
This is a program that duplicates itself and then infects the
computer. It spreads like a real biological virus, wherein it attaches itself to a host program and infect other computers if it is received by a computer through the internet. The virus can also be transferred by the use of removable storage media such as diskette, CF, lash drives, memory cards, and others. HACKER
This is a person who is able to enter and control other people’s
computer without authorization. A hacker is able to enter another’s computer , usually vandalizes the victim’s websites, steals personal information , obtains intellectual property and performs credit card fraud. Technology is a useful servant but a dangerous master.. -Christian Lous Lange