0% found this document useful (0 votes)
14 views7 pages

The Kind of Online Threats

The document outlines various types of online threats, including phishing, pharming, internet scams, malware, and cyberbullying, emphasizing the need for vigilance while using the internet. It describes how these threats can lead to financial loss, identity theft, and damage to personal and brand reputation. Additionally, it provides examples of harmful software and encourages users to think critically before engaging with online content.

Uploaded by

ainsleyashtieran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views7 pages

The Kind of Online Threats

The document outlines various types of online threats, including phishing, pharming, internet scams, malware, and cyberbullying, emphasizing the need for vigilance while using the internet. It describes how these threats can lead to financial loss, identity theft, and damage to personal and brand reputation. Additionally, it provides examples of harmful software and encourages users to think critically before engaging with online content.

Uploaded by

ainsleyashtieran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Lesson 2.

2: Kinds of Online Threats


There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities to
attack computers and retrieve sensitive data from individuals. Half the time, we aren’t
even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components, such
as links in email or Instant Messaging apps, or any malware attachments on servers
that access the Web. They benefit cybercriminals by stealing information for subsequent
sale and help absorb infected PCs into botnets. Web threats pose a broad range of
risks, including financial damages, identity theft, loss of confidential information/data,
theft of network resources, damaged brand/personal reputation, and erosion of
consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:

 Phishing happens when an email is sent from an internet criminal disguised as


an email from a legitimate, trustworthy source. The message is meant to lure you
into revealing sensitive or confidential information.

Image source: https://searchsecurity.techtarget.com/definition/phishing


 Pharming happens when a hacker (or “pharmer”) directs an internet user to a
fake website instead of a legitimate one. These “spoofed” sites can capture a
victim’s confidential information, including usernames, passwords, and credit
card data, or install malware on their computer. Pharmers usually focus on
websites in the financial sector, including banks, online payment platforms, or
other e-commerce destinations.

Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html

 Internet Scam generally refers to someone using internet services or software to


defraud or take advantage of victims, typically for financial gain. Cybercriminals
may contact potential victims through personal or work email accounts, social
networking sites, dating apps, or other methods in attempts to obtain financial or
other valuable personal information. Online scams may come in various forms
such as lottery scam, charity fraud scams, job offer scams, and online dating
scams to name a few.
 Internet robots are also known as spiders, crawlers, and web bots. It is a
software application that is programmed to do certain tasks. Bots are automated,
which means they run according to their instructions without a human user.
Some bots are useful, such as search engine bots that index content for search
or customer service bots that help users. Other bots are "bad" and are
programmed to break into user accounts, scan the web for contact information
for sending spam, or perform other malicious activities. If it's connected to the
Internet, a bot will have an associated IP address.

 Malware or malicious software, is any program or file that is harmful to a


computer user. Here are the most common offenders in the rogues’ gallery of
malware:
Adware (advertising supported software) is unwanted software designed
to throw advertisements up on your screen. Example, pop-up ads and
banner ads.
Spyware is malware that secretly observes the computer user’s activities
without permission and reports it to the software’s author. Example is a
keylogger.
Virus and Worms are malwares that attach to another program and,
when executed—unintentionally by the user—replicates itself by modifying
other computer programs and infecting them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It
usually represents itself as something useful in order to trick you. Once it’s
on your system, the attackers behind the Trojan gain unauthorized access
to the affected computer. From there, Trojans can be used to steal
financial information or install threats like viruses and ransomware.
Ransomware is a form of malware that locks you out of your device
and/or encrypts your files, then forces you to pay a ransom to get them
back.
 Spams are unsolicited emails, instant messages coming from recipients that are
not granted verifiable permission for the message to be sent. Spam messages
can be damaging if you open or respond to it.
 Cyberstalking refers to the use of the internet or other electronic device to
harass or stalk individuals or organizations.
 Cyberbullying refers to the act of tormenting, harassing, or embarrassing
another person using the internet.

 Spoofing happens when someone or something pretends to be something else


to gain our confidence, get access to our systems, steal data, steal money, or
spread malware.

WHAT CAN I DO
ACTIVITY 2.3: Show Me How You Hashtag
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in your activity notebook.

Image source: https://www.avg.com/en/signal/what-is-spyware Image source: https://itigic.com/tag/adware/

1. #_______________________
2. # _____________________

Image source: https://dlpng.com/png/6702600 Image source:https://www.gtmaritime.com/free-phishing-


penetration-test/

3. # ________________________ 4. # _____________________
Image source: http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-
telco-player-to-benefit-consumers-says-globe-telecom/

5. # ___________________________

WHAT I HAVE LEARNED


Reflect on this and write your answers in your notebook.

From all you have learned in


Lesson 2, why is there a need
to “think before you click?”
Image source:
https://shieldguide.wordpress.com/2017/03/12/think-
before-you-click/

______________________________________________________________________
______________________________________________________________________
____________________________________________________________

ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.

1. What type of malicious program is designed to replicate itself and transfer from
one computer to another either through the internet or local networks or data
storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal
passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

4. What is ransomware based on?


A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important files

5. Which of the following is an example of a “phishing” attack?


A. Sending someone an email that contains a malicious link that is
disguised to look like an email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in
order to trick users into entering their login information.
C. Sending someone a text message looks like a notification that the person
has won a contest.
D. Sending someone an email that records their keystroke activities while
using their computers.

6. Which of the following must NOT be done if you received an embarrassing


picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends

C. Talk to your friend about its negative outcomes.


D. Discourage your friend from sending pictures like that.

7. What is a flame in cyberspace?


A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.

8. What is considered shouting over the Internet?


A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.

9. To avoid being cyber-bullied you should always...


A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on
Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.

10. How are you judged in cyberspace?


A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your
spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it's okay.

You might also like