1
1
1
a. Virus
a malicious program designed to replicate itself and transfer from one computer to another
either through the Internet and local networks or data storage like flash drives and CDs.
b. Worm
a malicious program that transfers from one computer to another by any type of means
c. Trojan
a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information
asks the user to pay to improve his/her security but in reality, they are not
protected at all
d. Spyware
a program that runs in the background without you knowing it (thus called “spy”)
It has the ability to monitor what you are currently doing and typing through keylogging
Keyloggers
used to record the keystroke done by the users. This is done to steal their password or
any other sensitive information. It can record email, messages, or any information you
type using your keyboard
e. Adware
2. Spam
3. Phishing
Its goal is to acquire sensitive personal information like passwords, and credit card details
This is done by sending you an email that will direct the users to visit a website and be asked to
update his/her username, password, credit card, or personal information
Pharming
a more complicated way of phishing where it exploits the DNS (Domain Name Service) system
Something you and your friends find funny today may be something that could harm
someone’s reputation later.