You cannot view this unit as you're not logged in yet.
Types of Virus Threats
Online Safety

0 POINTS
Complete the units, enroll in new courses, answer survey questions
By gaining points, you can win a personalised one on one coaching session
Complete the course to see how your learning has improved and gain 10 points
Answer the questions in each unit to generate your custom action plan and gain points
Collect points to be able to ask an expert any question you may have
Module 1 | Online Safety | |
---|---|---|
Unit 1 | Online Safety Pre-Test | |
Unit 2 | How to Prevent Phishing | |
Unit 3 | How to Have a Strong Password | |
Unit 4 | Importance of Privacy Settings | |
Unit 5 | Useful Software for Online Protection | |
Unit 6 | How to Detect an Untrustworthy Website | |
Unit 7 | 4 Tips on How to Keep Your Device Secure | |
Unit 8 | 4 Steps on How to Avoid and Handle Identity Theft | |
Unit 9 | Ignore or Report a Cyber Bully | |
Unit 10 | Types of Virus Threats | |
Unit 11 | Reasons Why You Shouldn’t Interact With Strangers | |
Unit 12 | Online Safety Post Test |
Survey Questions
These are 5 types of possible threats that may occur at any time using the internet:
-
Trojans: Trojans are the most popular and complicated threats of all. Trojan is a standout amongst the biggest dangers among all internet viruses. It can conceal itself from antivirus discovery and take essential account information to trade-off a financial balance. Accordingly, a Trojan can cause many sorts of harm beginning from a PC to an online record.
-
Spyware: Is a malware designed to manipulate any computer and/or mobile device for spying on the user. Spyware is used for blackmail, sensitive data, and phishing. Spyware will spy on daily activity and make a phishing scam accordingly. Example, if you search for cars for a week, the hacker will make a phishing site about cars to trick you to input your information.
-
Botnet: Botnet is something that is installed to hijack your computer, the result is the computer becomes a bot used to create large-scale attacks.
-
Chain letters: Some emails trick you into sending them and sharing them with others only to replicate a virus.
-
Yourself: You can be a threat to yourself sometimes if you do not browse safely. You can cause yourself harm to your privacy and security if you use the internet foolishly.