0% found this document useful (0 votes)
5 views29 pages

10 Social Implications

The document discusses various forms of cybercrime and online threats, including malware, phishing, and identity theft, highlighting their implications for users. It explains different types of malicious software, such as viruses, worms, and ransomware, as well as tactics like e-mail spoofing and pharming. Additionally, it touches on copyright laws and the concept of fair use in relation to digital content.

Uploaded by

Aj Ntsakiso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views29 pages

10 Social Implications

The document discusses various forms of cybercrime and online threats, including malware, phishing, and identity theft, highlighting their implications for users. It explains different types of malicious software, such as viruses, worms, and ransomware, as well as tactics like e-mail spoofing and pharming. Additionally, it touches on copyright laws and the concept of fair use in relation to digital content.

Uploaded by

Aj Ntsakiso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Social

Implications
Internet and e-mail threats
Criminals today have a bunch of
tricks that can be used to find
breaches, hack systems and steal
important data and information,
causing serious financial and even
intellectual harm.
Tricks such as malicious links,
malicious attachments, fake
webpages, and spoofed names and
addresses.
Cybercrime
Cybercrime is criminal activity that either
targets or uses a computer, a computer
network or a networked device.
Most, but not all, cybercrime is committed
by cybercriminals or hackers who want to
make money. Cybercrime is carried out by
individuals or organisations.
How will you know there is a
virus on your computer?
Frequent pop-up windows. Pop-ups might encourage you
to visit unusual sites. Or they might prod you to download
antivirus or other software programs.
Changes to your homepage. Your usual homepage may
change to another website, for instance. Plus, you may be
unable to reset it.
Mass emails being sent from your email account. A criminal
may take control of your account or send emails in your
name from another infected computer.
How do you know there is a virus
on your computer? (cont.)
Unusually slow computer performance. A sudden
change of processing speed could signal that your
computer has a virus.
Unknown programs that start up when you turn on your
computer. You may become aware of the unfamiliar
program when you start your computer. Or you might notice
it by checking your computer’s list of active applications.
Unusual activities like password changes. This could
prevent you from logging into your computer.
Computer viruses

A computer virus is any program that infects a user’s


computer and acts in a way that will harm users
without their knowledge.
Users do not install viruses; viruses spread
automatically, without the users knowing about them.
Leave
my
compute
r!
Trojan Horse
A Trojan horse is a program that
appears to be useful or entertaining,
but it carries a hidden malicious
function that is activated when the
program is run. Some Trojan horses
even masquerade as repair tools,
claiming to remove threats from your
computer but actually doing the
opposite.
Worm
A computer worm is a type of malware that spreads
copies of itself from computer to computer. A worm can
replicate itself without any human interaction, and it
does not need to attach itself to a software program in
order to cause damage.
Worms can be transmitted via software vulnerabilities.
Or computer worms could arrive as attachments in
spam emails or instant messages (IMs).
Once opened, these files could provide a link to a
malicious website or automatically download the
computer worm. Once it’s installed, the worm silently
goes to work and infects the machine without the
user’s knowledge.
Malware

Malware is the collective name for a number of


malicious software variants, including viruses,
ransomware and spyware.
Malware typically consists of code developed by
cyberattackers, designed to cause extensive damage to
data and systems or to gain unauthorized access to a
network.
Malware
Ransomware
Ransomware is a type of malicious
software that infects a computer and
restricts users' access to it until a ransom
is paid to unlock it. Ransomware variants
have been observed for several years and
often attempt to extort money from victims by
displaying an on-screen alert.
Phishing
Phishing is a type of social engineering
attack often used to steal user data,
including login credentials and credit card
numbers.
It occurs when an attacker, masquerading as
a trusted entity, dupes a victim into opening
an email, instant message, or text message.
Spyware

Spyware is unwanted software that infiltrates your


computing device, stealing your internet usage data
and sensitive information.
Spyware is classified as a type of malware — malicious
software designed to gain access to or damage your
computer, often without your knowledge.
Adware

Adware is software that displays unwanted advertisements on your


computer. Adware programs will tend to serve you pop-up ads, can
change your browser’s homepage, add spyware and just bombard
your device with advertisements.
It’s not quite a virus and it may not be as obviously malicious as a
lot of other problematic code floating around on the Internet. Not
only can adware be really bothersome every time you use your
machine.
Hoax
A computer hoax is a deceitful message warning
the recipients of a non-existent computer virus.
The message is usually a chain e-mail that tells
the recipients to forward it to everyone they
know.
Pharming
An example of pharming would be if a user
would open their browser and enter the
web address of their bank in order to
complete a transaction in online banking.
However, the user is redirected to a fraudulent
site that looks like the bank's website.
Pharming is a form of cyberattack that
sends you to a fake website that looks like
the real thing. ... Once on the fake site
hackers will either attempt to gain access to
personal/financial information, or they will use
the fake site to infect your computer with
viruses, malware, or other malicious software.
Have a look at the pharming example on
the next slide.
Pharming example
HTTP AND HTTPS
HTTP stands for Hypertext Transfer Protocol. At it’s most basic, it
allows for the communication between different systems. It’s
most commonly used to transfer data from a web server to a
browser in order to allow users to view web pages.
HTTPS stands for Hypertext Transfer Protocol Secure. The
problem with the regular HTTP protocol is that the information
that flows from server to browser is not encrypted, which means
it can be easily stolen. HTTPS protocols remedy this by using
an SSL (secure sockets layer) certificate, which helps create a
secure encrypted connection between the server and the
browser, thereby protecting potentially sensitive information from
being stolen as it is transferred between the server and the
browser.
E-mail Spoofing
E-mail spoofing is the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere
other than the actual source. E-mail spoofing is a tactic used in
phishing and spam campaigns because people are more likely to
open an e-mail when they think it has been sent by a legitimate
source.
Identity theft
Identity theft and identity fraud are
terms used to refer to all types of crime in
which someone wrongfully obtains and
uses another person's personal data in
some way that involves fraud or
deception, typically for economic gain.
This guy buys something on my account
without my consent!
Data theft
Data theft is the act of stealing computer-based information from an
unknowing victim with the intent of compromising privacy or obtaining
confidential information. Data theft is increasingly a problem for individual
computer users, as well as big corporate firms.
 E-commerce: You should make sure that your data is safe from prying
eyes when you sell or buy things on the Web. Carelessness can lead to
leaking your private account information.
 Password cracking: Intruders can access your machine and get valuable
data if it is not password-protected or its password can be easily decoded
(weak password).
Data theft (‘cont.)
 Eavesdropping: Data sent on insecure lines can be wiretapped and
recorded. If no encryption mechanism is used, there is a good chance of
losing your password and other private information to the eavesdropper.
 Laptop theft: Increasingly incidents of laptop theft from corporate firms
occur with the valuable information stored in the laptop being sold to
competitors. Carelessness and lack of laptop data encryption can lead to
major losses for the firm.
Copyright and fair use
Copyright is the lawful right of an author, artist,
composer or other creator to control the use of his or
her work by others. Generally speaking, a copyrighted
work may not be duplicated, disseminated, or
appropriated by others without the creator's
permission. The public display or performance of
copyrighted works is similarly restricted.

Fair use is the right to use a copyrighted work under


certain conditions without permission of the copyright
owner.
Be safe!

You might also like