MODULE 2.5
SAFE INTERNET USE
,Contents
• Viruses
• Computer worms
• Trojans
• Spam
• Hoaxes and scams
• Phishing
• Pharming
• Email spoofing
• Activity 1
• Guidelines for using the internet
safely
• Test and improve
• Written module activity
2
, Viruses
• Software that disrupts normal functioning of a
computer
• Loaded on computer without knowledge or
consent of user
• Designed to create and exploit security
loopholes
• Try to reproduce and spread to other computers
• Do not attack hardware – but software that
manages and controls hardware 3
SAFE INTERNET USE
,Contents
• Viruses
• Computer worms
• Trojans
• Spam
• Hoaxes and scams
• Phishing
• Pharming
• Email spoofing
• Activity 1
• Guidelines for using the internet
safely
• Test and improve
• Written module activity
2
, Viruses
• Software that disrupts normal functioning of a
computer
• Loaded on computer without knowledge or
consent of user
• Designed to create and exploit security
loopholes
• Try to reproduce and spread to other computers
• Do not attack hardware – but software that
manages and controls hardware 3