A Trip to ICT and Society Series 1 : INFECTED! PART 2
-
Upload
ianpoblete13 -
Category
Technology
-
view
17 -
download
0
Transcript of A Trip to ICT and Society Series 1 : INFECTED! PART 2
![Page 1: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/1.jpg)
![Page 2: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/2.jpg)
A trip to ICT and Society
By: Group 2 ICT-TLE
Grade 7-Newton
Members will follow via discussion INFECTED!!!
![Page 3: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/3.jpg)
SPYWARE
A trip to ICT and Society
INFECTED!!!PLEASE STAND BY...
To begin the course, click on one of the hyperlinks:
VIRUS WORMS TROJANS
PHISHING SPAMMING
![Page 4: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/4.jpg)
VIRUSES: INFECTION SPREADS
A computer virus is a type of malware that, when executed,
replicates by inserting copies of itself into the computer or network directly.
![Page 5: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/5.jpg)
WORMS: INFECTION MULTIPLIES
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
![Page 6: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/6.jpg)
TROJANS: INFECTION IS STEALTHED
A Trojan horseor Trojan is a non-self-replicating type of malware
program containing malicious code.
![Page 7: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/7.jpg)
SPYWARE: THE FBI IS WATCHING
Spyware is a software
aiding a person or organization to collect data from a person, unsuspecting the application installed.
![Page 8: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/8.jpg)
PHISHING AND SPOOFING: LEGITIMATE THREATS
Phishing is the collection of data from users accessing a “legitimate” website. Spoofing is falsifying documents.
![Page 9: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/9.jpg)
SPAMMING: FLOODED INBOX
Spamming is the process of delivering non-sensical messages to people, and can also carry an infected attachment.
![Page 10: A Trip to ICT and Society Series 1 : INFECTED! PART 2](https://reader035.fdocuments.net/reader035/viewer/2022071815/55a892af1a28ab26608b4696/html5/thumbnails/10.jpg)
Are you protected?
• The mentioned security risks often come from the internet database.
• Keep yourself protected using an anti-virus program
• Copyright Infringement is a crime. This Presentation is “All Rights Rserved 2014”