Etech Q1M2
Etech Q1M2
Etech Q1M2
EMPOWERMENT TECHNOLOGIES
12
Quarter 1 – Module 2
Online Safety, Security, Ethics
and Etiquette Standards
i
Knowledge Bank
2. Adware
Adware is a type of malware software that displays unwanted ads
when a user is surfing the internet. It is often included in many shareware
or freeware downloads as a legitimate way of generating advertising
revenues that help fund development. However, some websites are
infected with malicious adware that are automatically downloaded to your
computer.
3. Trojan
Trojans leave your computer completely unprotected, which can mean
that hackers can steal any data from your system. Trojans often present
themselves as harmless computer programs so that hackers can
penetrate your computer without being detected.
4. Virus
One of the most talked about internet threats is a virus. Viruses
usually attach themselves covertly to downloads as they are designed to
spread at an alarming rate. Viruses are often attached to files for
download, shared via CDs, DVDs, and USB sticks, or loaded on to
computers by opening infected email attachments.
5. Worms
Worms usually make their way on to a computer via a malicious email
attachment or USB stick. Once your computer has been infected by a
worm, it will likely send itself to every email address logged in your
system. To the receiver, your email will appear harmless, until they open
it and are infected by the same worm.
6. Phishing
In its simplest terms, phishing is a form of fraudulent activity. More
often than not, official-looking emails are sent impersonating a well-known
provider, such as a bank. These emails are sent to acquire people’s
passwords and credit card details.
7. Spyware
Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files.
Once installed on your computer, spyware can monitor your keystrokes,
read and delete your files, reformat your hard drive, and access your
applications. Whoever is controlling the spyware has access to your
personal details without you even knowing.
8. Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard
actions. Most keyloggers will be looking for distinguishable key entries,
such as bank card details and passwords. Keylogging is often linked to
identity and intellectual property theft.
9. Pharming
Pharming is a more complex version of phishing that exploits the DNS
system. Pharmers often create web pages mimicking that of a trustworthy
business, such as an online banking log-in page. Users will then enter their
details, thinking they are logging in to their usual service, and their details
will be stolen by the pharmer.
Netiquette
Netiquette is short for "Internet
etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good
behavior on the Internet. This includes several
aspects of the Internet, such as
email, social media, online chat, https://www.eu-in-the-
media.eu/index.php/meetings/item/15-
web forums, website comments, multiplayer
netiquette-and-online-awareness
gaming, and other types of online
communication.