KEMBAR78
Week 3 Lesson 2 | PDF | Computer Virus | Email Spam
0% found this document useful (0 votes)
31 views17 pages

Week 3 Lesson 2

The document discusses various email threats including viruses, Trojans, worms, hoaxes, spam, phishing, pharming, and email spoofing, explaining their functions and dangers. It emphasizes the importance of using anti-virus software, updating it regularly, and being cautious with unknown emails and attachments. Additionally, it provides tips for safe email and internet use to protect personal information.

Uploaded by

whatrandom24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views17 pages

Week 3 Lesson 2

The document discusses various email threats including viruses, Trojans, worms, hoaxes, spam, phishing, pharming, and email spoofing, explaining their functions and dangers. It emphasizes the importance of using anti-virus software, updating it regularly, and being cautious with unknown emails and attachments. Additionally, it provides tips for safe email and internet use to protect personal information.

Uploaded by

whatrandom24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Social Implications

Part 2

1
E-mail threats, issues and
remedies

There are a lot of email threats likes

 Viruses
 Trojans and
 Worms

2
A virus can make a person
sick ?

3
What is a Computer virus

IS IT A
BUG ???

4
What makes a computer
sick ?
PROGRAMMED
SOFTWARE


VIRUS

BUGX object Virus1:


TForm1
Left = 192
Top = 115
Width = 702
Height = 479
Caption =
‘VIRUS‘
Do = ‘DESTROY’
Color =
5 clBtnFace
Font.Charset =
Viruses

 A virus is NOT A
BUG, it is software or
a programme that
copies itself onto ones
computer and
corrupts and destroys
data without the
knowledge or
permission from the
6
Trojan Horse

 Trojan is a program that


hides inside a useful
program, you are then
tricked into opening it, as
soon as you open it you
activate the Trojan, this
virus can delete files or
copy personal information
and sending it back to the
owner of the Trojan
7
Worms

A worm is software or
a programme that
copies itself on the
network or in the
memory, where it
then uses up the
resources and slow
down the system.
8
STOP THE VIRUS !!!!

9
How to stop the virus

 Buy Anti-virus software


 Update software daily
because viruses are created
daily.
 Do NOT NOT NOT open a email
or attachment from an
unknown person.

10
Hoaxes

 A Hoax is an e-mail that trick you in


believing something that is not true, for
example chain letters that you must sent to
many others, this software will gather e-mail
addresses for advertisement

11
Spam

 Spam is junk mail,


selling products or
advertising products,
this software then
gathers address
books email
addresses.
12
Phishing

 Phishing is a process
of trying to get the
user to give out
personal information
like pin codes and
passwords, it can be
disguised as a bank
for instance.
13
Pharming

 Pharming is very similar


to Phishing except it
don’t sent you a e-mail in
the case of phishing this
is where a user will be
tricked away from a
genuine website to a fake
website.

14
Email spoofing

 E-mail spoofing is
where the e-mail
header is being
changed to a
commonly know
source, for example
a well known cell
phone company the
moment you open it,
it gains access to
your system
15
E-mail treats

 SPYWARE – this is software that


secretly loads onto your computer
to spy – collect personal
information from the user

 MALWARE – this is malicious


software like viruses, software
loaded through the internet to
destroy your computer
16
Safe email and Internet use – dangers and tips
to ensure safe use

 Do NOT open an email or


attachment from an unknown
person.
 Download programs from the
Internet with caution
 If you see something that you
don’t trust asked help from
parents
 Load Anti-Spyware software
17

You might also like