KINDS OF ONLINE
THREATS
ONLINE THREAT
is deemed any malicious act that attempts to
gain access to a computer network without
authorization or permission from the owners.
These are usually done by computer hackers
who uses the World Wide Web to facilitate
cybercrime.
KINDS OF ONLINE THREATS
PHISHING
INTERNET SCAM
PHARMING
CYBER BULLYING
CYBER STALKING
INTERNET ROBOTS
SPOOFING
SPAMS MALWARE
PHISHING
happens when an email is
sent from an internet criminal
disguised as an email from a
legitimate, trustworthy source.
The message is meant to lure
you into revealing sensitive or
confidential information.
Pharming
happens when a hacker (or
“pharmer”) directs an internet
user to a fake website instead of
a legitimate one. These
“spoofed” sites can capture a
victim’s confidential information,
including usernames,
passwords, and credit card data,
or install malware on their
computer. Pharmers usually
focus on websites in the
financial sector, including banks,
online payment platforms, or
other e-commerce destinations.
Internet Scam
generally refers to someone using
internet services or software to
defraud or take advantage of victims,
typically for financial gain.
Cybercriminals may contact potential
victims through personal or work
email accounts, social networking
sites, dating apps, or other methods
in attempts to obtain financial or other
valuable personal information. Online
scams may come in various forms
such as lottery scam, charity fraud
scams, job offer scams, and online
dating scams to name a few
Internet robots
are also known as spiders, crawlers, and web bots. It is
a software application that is programmed to do certain
tasks. Bots are automated, which means they run
according to their instructions without a human user.
Some bots are useful, such as search engine bots that
index content for search or customer service bots that
help users. Other bots are "bad" and are programmed to
break into user accounts, scan the web for contact
information for sending spam, or perform other
malicious activities. If it's connected to the Internet, a bot
will have an associated IP address
Malware or malicious software,
is any program or file that is harmful to a computer user
Adware (advertising supported software) is unwanted software designed to throw
advertisements up on your screen. Example, pop-up ads and banner ads.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author. Example is a keylogger.
Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and
infecting them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system, the
attackers behind the Trojan gain unauthorized access to the affected computer. From
there, Trojans can be used to steal financial information or install threats like viruses and
ransomware.
Ransomware is a form of malware that locks you out of your device and/or encrypts your
files, then forces you to pay a ransom to get them back.
Spams
are unsolicited emails, instant messages
coming from recipients that are not granted
verifiable permission for the message to be
sent. Spam messages can be damaging if
you open or respond to it.
Cyberstalking
refers to the use of
the internet or other
electronic device to
harass or stalk
individuals or
organizations.
Cyberbullying
refers to the act of
tormenting,
harassing, or
embarrassing
another person
using the internet
Spoofing
happens when someone or
something pretends to be
something else to gain our
confidence, get access to our
systems, steal data, steal money,
or spread malware.
Direction: Look at the following images and create a hashtag
based on the type of online threat represented by each image.
Write your answers in a ¼ sheet of paper.
1. # __________________
2. #_______________
3. #_________________
4.#___________
5. #_____________
Reflect on this and write your answers in
your notebook.
From all you have
learned in Lesson 2,
why is there a need
to “think before you
click?”
Directions: Read each item carefully and choose the letter of
the correct answer. Write your answers on a ¼ sheet of paper.
1.What type of malicious program is designed to replicate
itself and transfer from one computer to another either
through the internet or local networks or data storage like
flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you
advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes
done by users to steal passwords?
A. Adware C. Worms and Virus
B.Spyware D. Ransomeware
4. What is ransomware based on?
A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important files
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to
look like an email from someone reliable.
B.Creating a fake website that looks nearly identical to a real website in order to
trick users into entering their login information.
C. Sending someone a text message looks like a notification that the person has
won a contest.
D. Sending someone an email that records their keystroke activities while using
their computers.
6. What is ransomware based on?
A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important files
7. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look
like an email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick
users into entering their login information.
C. Sending someone a text message looks like a notification that the person has won
a contest.
D. Sending someone an email that records their keystroke activities while using their
computers.
8.What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it
looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt
someone's feelings, then it's okay.
D. You are judged by how you look - your profile picture is
important