0 оценок0% нашли этот документ полезным (0 голосов)
76 просмотров18 страниц
This document discusses various internet threats like viruses, hacking, malware, phishing, spam, spyware, Trojan horses, and ransomware. It explains that viruses can infect computers through email attachments or downloads. Hacking involves gaining unauthorized access to computers. Malware can damage computers and intimidate users with scareware. Pharming redirects users to fake websites. Phishing uses fake emails and websites to steal personal information. Spam is unsolicited messages sent in bulk. Spyware collects personal information secretly. Trojan horses disguise malicious programs as legitimate software. Ransomware restricts computer access until payment is made. The document also provides tips for protecting one's online reputation such as cleaning up negative information, securing
Исходное описание:
Оригинальное название
INTERNET THREATHS AND PROTECTING REPUTATION ONLINE
This document discusses various internet threats like viruses, hacking, malware, phishing, spam, spyware, Trojan horses, and ransomware. It explains that viruses can infect computers through email attachments or downloads. Hacking involves gaining unauthorized access to computers. Malware can damage computers and intimidate users with scareware. Pharming redirects users to fake websites. Phishing uses fake emails and websites to steal personal information. Spam is unsolicited messages sent in bulk. Spyware collects personal information secretly. Trojan horses disguise malicious programs as legitimate software. Ransomware restricts computer access until payment is made. The document also provides tips for protecting one's online reputation such as cleaning up negative information, securing
This document discusses various internet threats like viruses, hacking, malware, phishing, spam, spyware, Trojan horses, and ransomware. It explains that viruses can infect computers through email attachments or downloads. Hacking involves gaining unauthorized access to computers. Malware can damage computers and intimidate users with scareware. Pharming redirects users to fake websites. Phishing uses fake emails and websites to steal personal information. Spam is unsolicited messages sent in bulk. Spyware collects personal information secretly. Trojan horses disguise malicious programs as legitimate software. Ransomware restricts computer access until payment is made. The document also provides tips for protecting one's online reputation such as cleaning up negative information, securing
target you when you’re using the internet. This browser based threats include a range of malicious software programs that are designed to infect victim’s computer. VIRUS
Malicious computer programs that are often
sent as an email attachment or a download with the intent or infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of virus. HACKING
Hacking is a term used to describe actions
taken by someone to gain unauthorized access to your computer. The availability of information online on the tools, techniques, and malware makes it easier for even non- technical people to undertake malicious activities. MALWARE
Malware is one of the more common ways to
infiltrate or damage your computer. Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. PHARMING
Pharming is a common type of online fraud.
A means to point you a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. PHISHING
Phishing is used most often by cyber criminals
because it’s easy to execute and can produce the results they’re looking for with very little effort. Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial information from you. SPAM
Spam is one of the more common methods of both
sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social sites, company websites and personal blogs. SPYWARE
Spyware that collects personal information
about you without you knowing. They often come in the form of ‘free’ download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses. TROJAN HORSES
A malicious program that is disguised as, or
embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded. RANSOMWARE
Is a type of malware that restricts access to your
computer or you files and displays message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. HOW TO PROTECT YOUR ONLINE REPUTATION?
Clean up your current situation if there
are any negative things shown that under your control, delete them. HOW TO PROTECT YOUR ONLINE REPUTATION?
Register your domain name. If you wish to
insure yourself online, this prevents other people from using the name in the future. HOW TO PROTECT YOUR ONLINE REPUTATION?
Secure your name across all social
platforms HOW TO PROTECT YOUR ONLINE REPUTATION?
Don’t allow anyone to tag you in
pictures that might damage your reputation. HOW TO PROTECT YOUR ONLINE REPUTATION?
Think twice before you post. Never post on
social media when you’re angry and regardless of your privacy settings, never publish negative comments about coworkers, business associates, or customers. HOW TO PROTECT YOUR ONLINE REPUTATION?
In addition, manage online reviews
HOW TO PROTECT YOUR ONLINE REPUTATION?
Avoid opening unfamiliar websites
that may cause showing or opening pornography ads.