1 / 26

Aktiwiteit 1, bl 22

Aktiwiteit 1, bl 22. Internet Terminology/ terminologie. Phishing:  . Poging om sensitiewe en privaat inligting soos wagwoorde, kredietkaart besonderhede, rekeningnommers, ens. te bekom deur voor te gee die boodskap kom van 'n betroubare bron. e-pos en kitsboodskappe (sms) word gebruik.

tamas
Download Presentation

Aktiwiteit 1, bl 22

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Aktiwiteit 1, bl 22 Internet Terminology/ terminologie

  2. Phishing:   • Poging om sensitiewe en privaat inligting soos wagwoorde, kredietkaart besonderhede, rekeningnommers, ens. te bekom • deur voor te gee die boodskap kom van 'n betroubare bron. • e-pos en kitsboodskappe (sms) word gebruik KjuitgespreeksoosEngvisvang: fishing • ontvangers word na 'n valswebtuistewatsoos 'n egteeenlyk , bv. 'n bank, gelok • waaropdan vir bogenoemdebesonderhedegevra word.

  3. Spam • the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients./ groothoeveelheidadvertensies of promosiemateriaal (gemorspos) watontvangernienoodwendigwilhênie. • Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender./ persoonwatditstuurbetaal min daarvoor, maar dis die ontvangerwat die materiaalmoetaflaai, wat die meestebetaal.

  4. Inbox flooded with spam Spelling mistake – one of the indicators that it is spam

  5. Cookies • a piece of text stored on a user's computer by the web browser (internet explorer)/ teksdeeltjiewatdeurwebblaaier op gebruiker se rekenaargestoor word

  6. Cookies continued/ vervolg • to enable website to open quicker when user accesses the site again./ om die webbladgouerooptemaakwanneer die gebruikerditweerbesoek • Usually harmless, but can contain malicious software/ gewoonlikskadeloos, maar kansomsgevaarlikeprogrammatuurbevat • Use disk clean up to remove once a month/ veeeenkeer ‘n maandskoondeur disk cleanup

  7. Firewall • designed to block unauthorized access while permitting authorized communications./ ontwerpomongemagtigdetoegang tot jourekenaarteblokkeer. • permit or deny network transmissionsbased upon a set of rules and other criteria/ dit gee toestemmingvir of verhoed data oordragoor ‘n netwerk.

  8. Voorstelling van Firewall

  9. Spyware •  is a type of malicious software that can be installed on computers and collects little bits of information about users without their knowledge • and secretly monitors the user's computing habits • The presence of spyware is hidden and can be difficult to detect. • Spyware is secretly installed on the user's personal computer. • It collects information such as Internet surfing habits and sites that have been visited • Can interfere with user control of the computer for example installing additional software and redirecting Web browser activity. • Spyware can change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.

  10. Spyware This popup usually contains the spyware and is installed when user clicks on link.

  11. Keyloggers • Keystroke logging (often called keylogging) is the action of tracking the keys struck on a keyboard, • in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

  12. Keylogging in action

  13. Wireless key logging receiver

  14. Proxy server • A proxy server is a server that acts as an intermediary between your computer and other servers.

  15. Pop ups • Pop-up ads or pop-ups are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. • Pop-ups are generally new web browser windows to display advertisements. • A variation on the pop-up window is the pop-under advertisement, which opens a new browser window hidden under the active window. • Pop-unders do not interrupt the user immediately and are not seen until the covering window is closed, making it more difficult to determine which web site opened them.

  16. Flash • Adobe Flash (formerly Macromedia Flash) is a multimedia platform  • used to add animation, video, and interactivity to Web pages. • Flash is frequently used for advertisements and games.

  17. QuickTime •  is a multimedia framework  • developed by  Apple Inc. • QuickTime is capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity.

  18. ActiveX • A software module • It enables a program to add functionality by calling ready-made components that blend in and appear as normal parts of the program. • They are typically used to add user interface functions, such as 3D toolbars, a notepad, calculator or even a spread sheet.On the Internet, ActiveX controls can be linked to a Web page and downloaded by a compliant Web browser. Such controls turn Web pages into software as if the program were launched from a server. Like any executable program running in the computer, ActiveX controls can perform any operation on your data. This is why the default configuration in most Web browsers is to prompt the user if an ActiveX control is being requested so the user can decide to download it or not (not always an easy decision).

  19. ActiveX including different kinds of 3D buttons, switches, knobs, sliders, switch sliders, switchknobs and others can be widely applied in many industry HMI applications and Simulation environments.

More Related