Types of malware
Is it phishing or pharming
Chapter 1
Chapter 3
Chapter 5
100
Intended to make money for the creator of the advertisement.

Adware

100

Receiving an email that appears to be from a trusted colleague, containing a link to a shared document. The email is actually a clone of a previous message, with the link replaced by one that leads to a fake website designed to steal login credentials or personal information

Example of Phishing

100

Another benefit of digital media is that they make possible the creation of virtual spaces, or places that exist not in the real world but only online, including virtual schools and museums.

Virtual

100

When digital messages are used to threaten, torment, or embarrass someone.

Cyberbullying

100

Potentially dangerous breaches of security that can cause harm to a computer.


Computer threats

200

Collects information without the knowledge of the computer user often attached to a file or software that users want and it is downloading along with the desired files.

Spyware

200

Attackers targeted a US network technology company named Ubiquiti Networks and managed to steal $46.7 million using this type of hacking strategy.

Example of phishing

200

Every person is a citizen, or a member of different groups, whether at school, at home, or in his or her personal life.

citizen 

200

Repeatedly sending messages with an offensive or derogatory mean.

Harrassment

200

When someone uses someone else´s computer systems through unauthorized means.

Hacker

300

Computer programs that replicate and are spread from one computer to another, typically through downloads or email attachments.

Viruses

300

A user types the URL of their bank's website into their browser and is unknowingly redirected to a fraudulent version of the site without realizing it.

Example of pharming

300

Citizenship means participating in your world in a responsible way

citezenship

300

Insulting a participant in an online discussion or argument, using volatile and cruel language.

Flaming

300

Unsolicited messages sent to a large group of people.

Spam

400

They don´t need human action in order to spread they are not attached to existing programs.

Worms

400

 relies on deceptive emails or messages to trick users into taking action, whereas pharming manipulates DNS or local host files to redirect users automatically.

Phising

400

Cyber citizenship is taking responsibility for your role in cyberspace and engaging in positive and ethical decision-making to stay safe online.

Citezenship 

400

Revealing someone´s private thoughts, secrets, or peronal information.

Outing

400

Cyber criminals can contaminate a computer and turn it into this.

Zombie

500

But they do not need a human action order to spread. They use computer networks to spread.

Trojan horses

500

The practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.

Pharming

500

Many people are digital natives, or people who were born after the invention of digital technology and have grown up using it.

Digital Natives

500

Stealing someone´s passwords and impersonating him or her or creating a false account.

Deception

500

Messages that show up seemingly out of nowhere, while the user is surfing the web.

Pop-up

M
e
n
u