COMP 2057 Chapter Notes - Chapter 4: Malware, Ebay, Gmail

54 views24 pages
INTRODUCTION TO THE INTERNET
WEEK 4
INTERNET SAFETY & PRIVACY
Dr. Stephanos Mavromoustakos
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 24 pages and 3 million more documents.

Already have an account? Log in
Learning Objectives
This week, students should be able to:
Reflect on their internet use and how it
connects to privacy.
Discuss methods of protecting their
devices from hackers and malware
Apply HTML/CSS code for designing basic
HTML pages
2
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 24 pages and 3 million more documents.

Already have an account? Log in
Internet Safety & Privacy
Internet has many risks related to safety and
privacy:
Malware
Spam
Phishing
3
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 24 pages and 3 million more documents.

Already have an account? Log in

Document Summary

This week, students should be able to: reflect on their internet use and how it connects to privacy, discuss methods of protecting their devices from hackers and malware, apply html/css code for designing basic. Internet has many risks related to safety and privacy: malware, spam, phishing. Malware: malware (malicious software), is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Spam: electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site(or user). The most widely recognized form of spam is email spam. Other forms include instant messaging spam, spam in blogs/forums, etc. Phishing: phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions