0% found this document useful (0 votes)
206 views11 pages

Empowerment Technology Lesson 2

The document discusses various online dangers such as email spam, spoofing, and phishing that try to obtain personal information. It also covers malware like spyware, computer worms, Trojan horses, viruses, and the threat of hackers. The objective is to teach students about online safety, security, ethics, and etiquette standards when using technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views11 pages

Empowerment Technology Lesson 2

The document discusses various online dangers such as email spam, spoofing, and phishing that try to obtain personal information. It also covers malware like spyware, computer worms, Trojan horses, viruses, and the threat of hackers. The objective is to teach students about online safety, security, ethics, and etiquette standards when using technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Empowerment

Technology

Lesson 2
Online safety and security

Dangers on the internet

❖ Email Spam
Safety, Security, and Ethics ❖

Email Spoofing
Phishing
❖ Pharming
❖ Spyware
❖ Computer worm
❖ Trojan Horse
❖ Computer Virus
❖ Hacker

Windows Security
Objective:

Apply online safety, security, ethics, and


etiquette standards and practice in the use of
ICTs in relation to their specific professional
tracks.
L
Online Safety and Security

The internet is a powerful tool for learning


and communicating with people. However,
there are many dangers that you must watch
out for
DANGERS ON THE INTERNET

EMAIL SPAM EMAIL SPOOFING PHISHING PHARMING

❏ Also known as junk email This refers to deceitful email This is a deceitful practice of This is a dangerous hacker
❏ Unsolicited commercial practice in which the sender trying to get confidential attack on a website which
email sent from one source address is changed, so that it information such as passwords directs all traffic to that web site
with identical message sent would appear to have come and usernames, and credit card to another fictitious website.
to multiple recipient. details by making it appear as if it
from a different source usually
someone you know. comes from a trustworthy source.
This is a computer program that is
installed covertly on a personal
computer to collect information or
SPYWARE even take control over the computer
without the knowledge of the user.
This is a dangerous computer
program that replicates itself
COMPUTER WORM through a network.
TROJAN HORSE

This is a form of a malicious


software ( malware) fronting to
perform a good task, but
covertly performs undesirable
function with the intention of
entering the computer wiothout
the user’s consent.
COMPUTER VIRUS
This is a program that
duplicates itself and then
infects the computers.
HACKER

This is a person who is able to


enter and control other
people’s computer without
authorization.
Review

Would you recommend this book?


Write your review here.

You might also like