Aktiwiteit 1, bl 22 Internet Terminology/ terminologie.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

The Internet and the Web
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Mastering the Internet, XHTML, and JavaScript Chapter 2 Web Browsers.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Tutorial 7 Working with Multimedia. XP Objectives Explore various multimedia applications on the Web Learn about sound file formats and properties Embed.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Concepts 2014 Chapter 7 The Web and .
(2) C OMPUTER AND I NTERNET T ECHNICAL J ARGON. (2)C OMPUTER AND I NTERNET T ECHNICAL T ERMS (J ARGONS ) access : connection to the Internet account:
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Tutorial 7 Working with Multimedia. XP Objectives Explore various multimedia applications on the Web Learn about sound file formats and properties Embed.
Section 4 – Computer Networks Setting up a small network.
 The World Wide Web is a collection of electronic documents linked together like a spider web.  These documents are stored on computers called servers.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Tutorial 7 Working with Multimedia. New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition 2 Objectives Explore various multimedia applications.
Protecting Students on the School Computer Network Enfield High School.
Tutorial 7 Working with Multimedia. New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition 2 Objectives Explore various multimedia applications.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Using the Internet. (WWW) and the Internet The World Wide Web (WWW) is a small part of the Internet. The Internet relates to all the hardware and software.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
XP Browser and Basics COM111 Introduction to Computer Applications.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Terms – Online Advertising Banner ads - embedding an ad into a web page – known as a click through due to interactive actions where the consumer clicks.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Banner Ad. This form of online advertising entails embedding an advertisement into a web page. It is intended to attract traffic to a website by linking.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Felix’s Technology Dictionary
Presentation transcript:

Aktiwiteit 1, bl 22 Internet Terminology/ terminologie

Phishing:  Poging om sensitiewe en privaat inligting soos wagwoorde, kredietkaart besonderhede, rekeningnommers, ens. te bekom  deur voor te gee die boodskap kom van 'n betroubare bron.  e-pos en kitsboodskappe (sms) word gebruik  ontvangers word na 'n vals webtuiste wat soos 'n egte een lyk, bv. 'n bank, gelok  waarop dan vir bogenoemde besonderhede gevra word. Kjuitgespreek soos Eng visvang: fishing

Spam the practice of sending unwanted messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients./ groot hoeveelheid advertensies of promosiemateriaal (gemorspos) wat ontvanger nie noodwendig wil hê nie. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender./ persoon wat dit stuur betaal min daarvoor, maar dis die ontvanger wat die materiaal moet aflaai, wat die meeste betaal.

Inbox flooded with spam Spelling mistake – one of the indicators that it is spam

Cookies a piece of text stored on a user's computer by the web browser (internet explorer)/ teksdeeltjie wat deur webblaaier op gebruiker se rekenaar gestoor word

Cookies continued/ vervolg to enable website to open quicker when user accesses the site again./ om die webblad gouer oop te maak wanneer die gebruiker dit weer besoek Usually harmless, but can contain malicious software/ gewoonlik skadeloos, maar kan soms gevaarlike programmatuur bevat Use disk clean up to remove once a month/ vee een keer ‘n maand skoon deur disk cleanup

Voorstelling van Firewall

is a type of malicious software that can be installed on computers and collects little bits of information about users without their knowledge and secretly monitors the user's computing habits The presence of spyware is hidden and can be difficult to detect. Spyware is secretly installed on the user's personal computer. It collects information such as Internet surfing habits and sites that have been visited Can interfere with user control of the computer for example installing additional software and redirecting Web browser activity. Spyware can change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. Spyware

This popup usually contains the spyware and is installed when user clicks on link.

Keyloggers Keystroke logging (often called keylogging) is the action of tracking the keys struck on a keyboard, in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Keylogging in action

Wireless key logging receiver

Proxy server A proxy server is a server that acts as an intermediary between your computer and other servers.

Pop ups Pop-up ads or pop-ups are a form of online advertising on the World Wide Web intended to attract web traffic or capture addresses. Pop-ups are generally new web browser windows to display advertisements. A variation on the pop-up window is the pop- under advertisement, which opens a new browser window hidden under the active window. Pop-unders do not interrupt the user immediately and are not seen until the covering window is closed, making it more difficult to determine which web site opened them.

Flash Adobe Flash (formerly Macromedia Flash) is a multimedia platform used to add animation, video, and interactivity to Web pages. Flash is frequently used for advertisements and games.

QuickTime is a multimedia framework developed by Apple Inc. QuickTime is capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity.

ActiveX A software module It enables a program to add functionality by calling ready-made components that blend in and appear as normal parts of the program. They are typically used to add user interface functions, such as 3D toolbars, a notepad, calculator or even a spread sheet. On the Internet, ActiveX controls can be linked to a Web page and downloaded by a compliant Web browser. Such controls turn Web pages into software as if the program were launched from a server. Like any executable program running in the computer, ActiveX controls can perform any operation on your data. This is why the default configuration in most Web browsers is to prompt the user if an ActiveX control is being requested so the user can decide to download it or not (not always an easy decision).

ActiveX including different kinds of 3D buttons, switches, knobs, sliders, switch sliders, switchknobs and others can be widely applied in many industry HMI applications and Simulation environments.