Q1 Emtech Printing Online Threats Effective Internet Search Evaluating WebSites
Q1 Emtech Printing Online Threats Effective Internet Search Evaluating WebSites
Q1 Emtech Printing Online Threats Effective Internet Search Evaluating WebSites
There is no doubt that you need to be vigilant apps, or other methods in attempts to obtain
online. As the World Wide Web evolved over the financial or other valuable personal
information. Online scams may come in
years, many internet predators have been playing on various forms such as lottery scam, charity
vulnerabilities to attack computers and retrieve fraud scams, job offer scams, and online
dating scams to name a few.
sensitive data from individuals. Half the time, we
aren’t even aware it is happening until it is too late. Internet robots are also known as spiders,
crawlers, and web bots. It is a software
Online threat is deemed any malicious act application that is programmed to do certain
that attempts to gain access to a computer network tasks. Bots are automated, which means they
without authorization or permission from the owners. run according to their instructions without a
These are usually done by computer hackers who human user. Some bots are useful, such as
uses the World Wide Web to facilitate cybercrime. search engine bots that index content for
Web threats use multiple types of malwares and search or customer service bots that help
fraud, all of which utilize HTTP or HTTPS protocols, users. Other bots are "bad" and are
but may also employ other protocols and components, programmed to break into user accounts,
such as links in email or Instant Messaging apps, or scan the web for contact information for
any malware attachments on servers that access the sending spam, or perform other malicious
Web. They benefit cybercriminals by stealing activities. If it's connected to the Internet, a bot
information for subsequent sale and help absorb will have an associated IP address.
infected PCs into botnets. Web threats pose a broad Malware or malicious software, is any
range of risks, including financial damages, identity program or file that is harmful to a computer
theft, loss of confidential information/data, theft of user. Here are the most common offenders in
network resources, damaged brand/personal the rogues’ gallery of malware:
reputation, and erosion of consumer confidence in e- Adware (advertising supported
commerce and online banking. software) is unwanted software
The following are the top kinds of online designed to throw advertisements up
threats that you should be aware of: on your screen. Example, pop-up ads
and banner ads.
Phishing happens when an email is sent from
Spyware is malware that secretly
an internet criminal disguised as an email
observes the computer user’s
from a legitimate, trustworthy source. The
activities without permission and
message is meant to lure you into revealing
reports it to the software’s author.
sensitive or confidential information.
Example is a keylogger.
Pharming happens when a hacker (or Virus and Worms are malwares that
“pharmer”) directs an internet user to a fake attach to another program and, when
website instead of a legitimate one. These
“spoofed” sites can capture a victim’s executed—unintentionally by the user
confidential information, including usernames, —replicates itself by modifying other
passwords, and credit card data, or install computer programs and infecting them
malware on their computer. Pharmers usually
focus on websites in the financial sector, with its own bits of code.
including banks, online payment platforms, or Trojan, or Trojan horse, is one of the
other e-commerce destinations.
most dangerous malware types. It
Internet Scam generally refers to someone
using internet services or software to defraud usually represents itself as something
or take advantage of victims, typically for useful in order to trick you. Once it’s
financial gain. Cybercriminals may contact
on your system, the attackers behind
potential victims through personal or work
email accounts, social networking sites, dating the Trojan gain unauthorized access
to the affected computer. From there,
Trojans can be used to steal financial Spoofing happens when someone or
something pretends to be something else to
information or install threats like
gain our confidence, get access to our
viruses and ransomware. systems, steal data, steal money, or spread
Ransomware is a form of malware malware.
There are billions of information on the web and it is a challenge for us to truly find which information is reliable
and relevant. Here are some tips you may use to be able to look for relevant and reliable sources:
Search Engines are websites used for retrieval of data, files, or documents from data bases. Some search
engines we use today are:
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and
addresses that refer to objects on the world wide web. Knowing the URL endings will give you clues to who is
sponsoring the website and help evaluate the sources.
1. Protocol 4. Top-level Domain 7. Named anchor
2. Subdomain 5. Folders/ Paths
https://www.searchenginejournal.com/alternative-searchengines/271409/#close
3. Domain 6. Page
4 5 Popular
1 2 3 6 7
Domains
Top- level Domains Country code top level domains
.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network
Search Skills and Tools
1. Boolean Logic – narrows, broadens, or eliminates search term.
a. Boolean “or” – this operator will find pages that include either of the search terms.
Ex. A or B
b. Boolean “and” – this operator will retrieve only pages containing both
terms
Ex. A and B
A B
c. Boolean “not” – this operator will find pages that do not include search term immediately
following it.
Ex. A not B
A B
2. Phrase Searching – is used to search for famous quotes, proper names, recommendations, etc. It
encloses the phrase in quotation marks.
Ex. “Jane Doe” “To be or not to be”
3. Plus (+) – indicates that the word after the sign is a required word must be found in search. Example:
+fire
4. Minus (–) sign – indicates to exclude a word from your search that is not required on the result.
Example: Jaguar speed –car
7. Finding Documents – using the filetype refines the search for documents on the web.
o filetype:pdf
o filetype:doc
o filetype:xls
developed the site. information presented is, and (2) how often
clearly provided: e-mail address, important to know when a site was created,
snail mail address, phone number, when it was last updated, and if all of the
and fax number. links are current. Evaluating a web site for
Credentials: the author should state currency involves finding the date
Does the site evaluate the links? Is the information comparable to other sites
on the same topic?
3. Coverage. This refers to how Does the text follow basic rules of
comprehensive the website is in their grammar, spelling and composition?
discussion of certain topics. Evaluating a Is a bibliography or reference list
included?
web site for coverage:
Does the site claim to be selective
or comprehensive?
Are the topics explored in depth?