Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
Technology
Lesson 2
Online safety and security
❖ Email Spam
Safety, Security, and Ethics ❖
❖
Email Spoofing
Phishing
❖ Pharming
❖ Spyware
❖ Computer worm
❖ Trojan Horse
❖ Computer Virus
❖ Hacker
Windows Security
Objective:
❏ Also known as junk email This refers to deceitful email This is a deceitful practice of This is a dangerous hacker
❏ Unsolicited commercial practice in which the sender trying to get confidential attack on a website which
email sent from one source address is changed, so that it information such as passwords directs all traffic to that web site
with identical message sent would appear to have come and usernames, and credit card to another fictitious website.
to multiple recipient. details by making it appear as if it
from a different source usually
someone you know. comes from a trustworthy source.
This is a computer program that is
installed covertly on a personal
computer to collect information or
SPYWARE even take control over the computer
without the knowledge of the user.
This is a dangerous computer
program that replicates itself
COMPUTER WORM through a network.
TROJAN HORSE