Final Module 3 Week 13 Internet Threats
Final Module 3 Week 13 Internet Threats
Final Module 3 Week 13 Internet Threats
Small businesses lose an average of $80,000 annually to cyber-attacks. In some cases, companies
bleed millions after losing precious data to cybercriminals.
Hence, reliable computer security is a must. But knowing the enemy is half the battle won, as the
saying goes. Thus, before you invest in any computer security service, you must first identify the
different internet security threats that can disrupt your business.
But what exactly are these threats? What are the basic steps you can do to avoid them?
Continue reading below for 10 of the most common forms of IT security threats and how to keep
them at bay.
1. Computer Viruses
Computer viruses are the most common among internet security threats out there. Viruses enter
your computers by attaching to a host file or a system. Once they enter your computer, they can
create damage instantly or remain dormant.
The goal of viruses is to infect your other computers and networked systems.
One of the basic steps to protecting your computers from viruses is by setting up a firewall. This
firewall works by blocking external access to your network systems.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 2
A firewall is not 100% foolproof. But it will at least deter or slow down cyber attackers.
2. Malware
Another common security threat to your computer systems is malware or ransomware. Malware
attacks your files and will only stop until you pay the cybercriminal a hefty ransom.
Studies reveal that malware affects 32% of all the computers in the world.
The attack starts by infecting your database systems. From there, it will encrypt your data then
pose a threat to delete all your files.
One of the first signs of a malware attack is the slowing down of your system. If you notice your
computers slowing down for no apparent reason, shut it down first. Disconnect them from the
internet then reboot your system.
Thereafter, you can install a security product to scan your system for malware. Furthermore, install
reputable antivirus software along with your firewall.
3. Phishing
The main targets of a phishing attack include your usernames, passwords, and credit card
information.
They steal valuable data by pretending to be banks and financial institutions, and they can also
impersonate reputable websites and even some of your personal contacts.
They use emails or instant messages that look legitimate at first glance. Their messages come with
URLs that prompt you to input your personal information. In turn, they’ll steal your credentials and
use them to access your accounts.
To keep away from phishing attacks, be mindful of the emails and messages you receive. If you
don’t know the sender, think twice before opening the message.
Also, check the content of your emails before opening any links. If you see a lot of misspelled
words, then a phishing attack is possible.
Additionally, invest in a total security program that offers protection against phishing attacks.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 3
4. Botnets
Of all the different forms of internet security threats, this is one of the most dangerous. A botnet is
similar to malware. However, it involves a network of computers that hackers compromised.
In turn, hackers use it to control the infected computers within the network. What makes it even
more dangerous is that hackers can control the network remotely.
Since the end goal of botnets is to force you to pay a ransom, installing a dependable security
program is paramount. And if you discover one of your computers carries a botnet, you must
remove the software and run an antivirus scan thereafter.
Furthermore, if you’re using cloud hosting, make sure to check your network protection. For
starters, it is wise to invest in dependable options like Microsoft Azure cloud.
6. Trojan Horse
A Trojan Horse is a program that looks legitimate and harmless. But in reality, it is a vector that
carries many harmful viruses. Once it gains network access, it can steal sensitive company data.
The most common method for Trojan Horse attacks is through email. The email usually comes with
a link or attachment containing the viruses. Once you open the attachment, it automatically
downloads malware to your computer.
Apart from installing cybersecurity software, you should update your software regularly. This also
includes your security patches.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 4
Protection against SQL attacks involves updating all your database software. Make sure to update
all security patches. Avoid sharing database accounts using different applications or sites.
8. Rootkit
Similar to botnets, a rootkit allows hackers to access your system remotely. They do this by placing
a collection of tools on your network. Some of the common forms of rootkit attacks include the
stealing of passwords and disabling antiviruses, among others.
Rootkits enter your network if your system security is vulnerable. Thus, the solution is to keep your
patches up-to-date.
To avoid this attack, you need a dependable security system. Also, do not download updates from
dubious sources. Additionally, update through legitimate sites and channels.
APT attacks are difficult to detect. Hence, you must pay attention to unusual patterns in your
network activity.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 5
Cyberthreats have become so widespread that the U.S. federal government has implemented a
research and development department designed to formulate a plan to develop technology and
create policies that minimize the potential risks in cyberspace.
With the rise in use of social media sites and networks, people are making more personal information
available to the online world, making it more difficult to protect valuable data. Fortunately, there are
a variety of ways to protect your own online identity and personal information.
Here are the top 10 ways you can protect yourself online:
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 6
sure to take this extra step when downloading or installing a browser to ensure your privacy and
safety.
To prevent your devices from being infected with malware, there are a number of steps you can take:
1. Install Anti-virus software
One of the most important ways to protect against malware is to install anti-virus software. Anti-virus
software will protect your device from malicious software that poses a threat to the system. It will scan
your computer to detect and clean the malware and provide automatic updates to provide enhanced
protection against newly created viruses.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 8
In addition to installing anti-virus software, it’s vital to ensure that your software is regularly updated to
stop attackers gaining access to your computer through vulnerabilities in older and outdated systems.
3. Only buy Apps from trusted sources
Buying apps from trustworthy sources reduces the chance of your device being infected with malware.
Big brands will take great care to ensure they do not damage their reputation by distributing malware.
To check the authenticity of a source, you can check the full name, list of published apps and contact
details in the app description within the Google Play or Apple app store.
4. Don’t click on suspicious links or download attachments from unknown sources
Phishing remains the easiest way for hackers to install malware on your device. Phishing scams trick
people into opening emails or clicking on a link that may appear to come from a legitimate business or
reputable source. The link may direct you to a fake website where you are prompted to enter your
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 9
personal details or take you to a website that directly infects your computer with malware. If in doubt,
don’t click the link.
5. Install Firewall
Another way to protect your device from malware is to use a firewall. A firewall prevents malicious
attacks by blocking all unauthorized access to or from a private computer network. In addition to anti-
virus software, a firewall provides an extra barrier against malware, reducing the chance of attack.
6. Back up data regularly
It’s important to back up on a regular basis to ensure that you can still retrieve all your valuable data and
files if your computer is infected with malware. This will help mitigate any damage and ensure that you
are not held victim to a ransomware attack.
Terminologies
Cookies:
Cookies are small pieces of information websites store on your computer. Cookies only contain bits
of text, not anything else. The text can be a user ID, session ID, or any other text. For example, web
pages can be configurable – a web page could have a Hide link that hides a certain element on the
page. The page can save this setting on your computer with a cookie. When you load the page in
the future, the page can examine the cookie and automatically hide the element.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 10
APT Threats:
As the name "advanced" suggests, an advanced persistent threat (APT) uses continuous, clandestine,
and sophisticated hacking techniques to gain access to a system and remain inside for a prolonged
period of time, with potentially destructive consequences.
Phishing:
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message by someone posing as a legitimate institution to lure individuals into providing sensitive
data such as personally identifiable information, banking and credit card details, and passwords.
Rootkit:
A rootkit is software used by cybercriminals to gain control over a target computer or network.
Rootkits can sometimes appear as a single piece of software but are often made up of a collection
of tools that allow hackers administrator-level control over the target device.
The most common is through phishing or another type of social engineering attack. Victims
unknowingly download and install malware that hides within other processes running on their
machines and give the hackers control of almost all aspects of the operating system.
Another way is through exploiting a vulnerability – i.e., a weakness in software or an operating
system that has not been updated – and forcing the rootkit onto the computer.
Malware can also be bundled with other files, such as infected PDFs, pirated media, or apps obtained
from suspicious third-party stores.
Botnet:
Botnets are networks of hijacked computer devices used to carry out various scams and
cyberattacks. The term “botnet” is formed from the word’s “robot” and “network.” Assembly of a
botnet is usually the infiltration stage of a multi-layer scheme. The bots serve as a tool to automate
mass attacks, such as data theft, server crashing, and malware distribution.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 11
Spyware:
Spyware is a type of software that installs itself on a device and secretly monitors a victim’s online
activity. It collects all sorts of data, including passwords, credit card numbers and browsing activity.
Adware:
Adware is a type of malware that once downloaded will unexpectedly show advertisements on the
victim’s computer. Adware doesn’t tend to steal data like other forms of malware, but it can be
extremely frustrating as the user is forced to see ads they would prefer not to. The ads range from
small banner ads to invasive pop windows that can’t be closed down.
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 12
References
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.
GE Elective Living in the IT ERA
Module 2: The Internet, Cyber Crime, Copyright and Plagiarism 13
14. https://developer.mozilla.org/en-
US/docs/Learn/Common_questions/Pages_sites_servers_and_search_engines
15. https://rackset.com/blog/what-is-web-server/
16. https://biratkirat.medium.com/how-does-web-work-7fb8c8a41ae7
17. https://www.javatpoint.com/what-is-world-wide-web
18. https://davidrbrown.com/how-the-course-and-the-web-works/
19. https://www.sitesaga.com/what-is-a-website/
20. https://www.computerhope.com/jargon/w/website.htm
21. https://medium.com/@vivekmadurai/web-evolution-from-1-0-to-3-0-e84f2c06739
22. https://disenowebakus.net/en/web-evolution
23. https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-difference/
24. https://computer.howstuffworks.com/web-
10.htm#:~:text=Some%20of%20the%20most%20prominent,presence%20as%20today's
%20sites%20do.
25. https://www.expertmarket.co.uk/web-design/different-types-of-websites
26. https://themeisle.com/blog/best-free-blogging-sites/
27. https://www.freelancer.com/articles/web-development/corporate-websites
28. https://www.thebalancesmb.com/best-crowdfunding-sites-4580494
29. https://www.inquirer.net/
30. https://www.linkedin.com/home
31. https://www.netflix.com/
32. https://www.funbrain.com/
33. https://www.wikihow.com/
34. https://tutorialsinhand.com/Articles/web-terminology.aspx
35. https://velecor.com/10-common-internet-security-threats-and-how-to-avoid-them/
36. https://programs.online.utica.edu/resources/article/ten-ways-to-protect-your-identity
37. https://www.phishing.org/what-is-phishing
38. https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats
39. https://www.howtogeek.com/119458/htg-explains-whats-a-browser-cookie/
40. https://www.metacompliance.com/blog/what-is-malware-and-how-to-prevent-against-
it/
The information, image/s, text or contents used in this learning module do not belong to me. This learning
module is intended for educational purposes only.