Module 4: Internet Threats
Module 4: Internet Threats
Module 4: Internet Threats
Page 1 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
Course Objectives:
a. enumerate and define the commonly known internet threats
b. provide examples of each
c. discuss the impacts of these internet threats and how to avoid them
Motivation:
1. What do you think when you hear the word “internet threat”?
INTERNET THREATS
Definition of terms:
• Internet Threats – also known as “web threats”
o are malware programs that can target you when you’re using the Internet
o they include a range of malicious software programs that are designed to
infect victims’ computers
Internet Threats:
SPAM
• Spam – unsolicited digital communication, often an email, that gets sent out in
bulk, unwanted emails mostly from bots or advertisements. This can be used to
send malware.
Types of Spam:
1. Phishing emails: trick victims into giving up sensitive information, e.g. website
logins, and credit card info, by way of social engineering and email spoofing.
Spoofed emails mimic, or spoof, an email from a legitimate sender, demanding
some sort of action. Well executed spoofs will contain familiar branding and
content, and sound urgent—even threatening.
Common phishing ploys include:
o A request for payment of an outstanding invoice.
o A request to reset your password or verify your account.
o Verification of purchases you never made.
o A request for updated billing information.
2. Malspam: any kind of malware spread via spam, it relies on social engineering to
trick recipients into taking some kind of action, often against our better
judgment, like clicking a download link, or opening an attachment contained in
the email that infects your computer with malware.
Activities of Botnets:
1. Distributed Denial of Service (DDoS) attacks that cause unplanned
application downtime
2. Validating lists of leaked credentials (credential-stuffing attacks) leading
to account takeovers
3. Web application attacks to steal data
4. Providing an attacker access to a device and its connection to a network
Page 3 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
MALWARE
• Malware – Malicious Software
o Can be used to cause harm to the computer, compromise computer
functions, bypass access controls, steal data and personal information, etc.
Types of Malware:
• Malicious Bots – self-propagating malware that infects its host and connects
back to a central server
o bots that attempt to carry out cybercrime, such as identity theft or account
takeover
Page 4 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
• credential stuffing
• web/content scraping
• DDoS attacks
• Brute force password cracking
• Spam content
• Email address harvesting
Page 5 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
• Security Bugs – are the most severe type of bugs and can allow attackers to
bypass user authentication, override access privileges, or steal data. This can
cause crashing or freezing.
• Ransomware – Holds a computer system captive while demanding a ransom.
Types of Ransomware:
Page 6 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
• Rootkit – type of malware that are designed so that they can remain hidden on
your computer. But while you might not notice them, they are active.
Rootkits give cybercriminals the ability to remotely control your
computer.
Page 7 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
Types of Spyware:
1. Adware: This type of spyware tracks your browser history and downloads, with
the intent of predicting what products or services you’re interested in. The
adware will display advertisements for the same or related products or services
to entice you to click or make a purchase. Adware is used for marketing
purposes and can slow down your computer.
2. Trojan: This kind of malicious software disguises itself as legitimate software. For
example, Trojans may appear to be a Java or Flash Player update upon
download. Trojan malware is controlled by third parties. It can be used to access
sensitive information such as Social Security numbers and credit card
information.
3. Tracking cookies: These track the user’s web activities, such as searches, history,
and downloads, for marketing purposes.
4. System monitors: This type of spyware can capture just about everything you do
on your computer. System monitors can record all keystrokes, emails, chat-room
dialogs, websites visited, and programs run. System monitors are often disguised
as freeware.
• Virus – type of malicious code or program written to alter the way a computer
operates and is designed to spread from one computer to another. This is designed to
spread from host to host and has the ability to replicate itself. This operates by inserting
or attaching itself to a legitimate program or document that supports macros in order
to execute its code.
Page 8 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
Types of Virus:
1. Boot sector virus: This type of virus can take control when you start — or boot —
your computer. One way it can spread is by plugging an infected flash drive into
your computer.
2. Web scripting virus: This type of virus exploits the code of web browsers and web
pages. If you access such a web page, the virus can infect your computer.
3. Resident virus: This is a general term for any virus that inserts itself in a computer
system’s memory. A resident virus can execute anytime when an operating
system loads.
4. Direct action virus: This type of virus comes into action when you execute a file
containing a virus. Otherwise, it remains dormant.
5. Polymorphic virus: A polymorphic virus changes its code each time an infected
file is executed. It does this to evade antivirus programs.
1. Transmitted via file- 1. Can modify and delete 1. Make sure OS and
sharing networks, files applications are up
information- transport 2. Inject additional to date because
features and software malicious software onto updates often
vulnerabilities a computer include patches for
2. When clicking links to 3. Depletes system security flaws
malicious websites resources by copying 2. Be extra cautious
3. Could arrive as itself over and over when opening
attachments in spam 4. Can steal data, install a unsolicited emails,
emails or IMs backdoor, allowing especially those
hacker to gain control from unknown
Page 9 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: Grade 11 and 12
Email: [email protected]; Website: www.uc-
bcf.edu.ph
References:
Adware Protection for Your Computer. (n.d.). Spam Laws. Retrieved August 13, 2020, from
https://www.spamlaws.com/adware-protect.html
Comodo. (n.d.). Rootkit Definition. Comodo Enterprise. Retrieved August 17, 2020, from
https://enterprise.comodo.com/rootkit-definition/
Malwarebytes. (n.d.). What is Spam? Definition & Types of Spam. Retrieved August 18, 2020, from
https://www.malwarebytes.com/spam/
Norton. (n.d.). What Are Bots? Retrieved August 13, 2020, from
https://us.norton.com/internetsecurity-malware-what-are-bots.html
Norton. (n.d.-a). Ransomware is malicious software that can take over your computer. Retrieved
August 17, 2020, from https://us.norton.com/internetsecurity-malware-ransomware-5-dos-
and-donts.html
Norton. (n.d.-c). What is a computer worm and how does it work? Retrieved August 18, 2020,
from https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html
Rootkit: What is a Rootkit? (n.d.). Veracode. Retrieved August 17, 2020, from
https://www.veracode.com/security/rootkit
What’s the Difference between a Virus and a Worm? (n.d.). Www.Kaspersky.Com. Retrieved
August 18, 2020, from https://www.kaspersky.com/resource-center/threats/computer-
viruses-vs-worms
FORMATIVE ASSESSMENT
Page 10 of 10