blog




  • Essay / Overview of Common Internet Threats

    Table of ContentsMalwareHackingCyberbullyingPhishingMalwareThis is malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. What it does is scare your software, which is usually a pop-up message that tells you that your computer has a security problem or other false information. They can corrupt your computer and reformat the hard drive, causing you to lose important information. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original essay They can modify your computer and reformat the hard drive, causing you to lose important information. Take full control of your computer and all software running on it. One of the first known examples of malware was the Creeper virus in 1971, created as an experiment by BBN Technologies engineer Robert Thomas. Creeper was designed to infect mainframes on ARPANET. Although the program did not modify functions, steal or delete data, the program moved from one central computer to another without authorization while displaying a teletype message stating: "I am the creeper: catch me if you can." Creeper was later modified. by computer scientist Ray Tomlinson, who added the ability to self-replicate to the virus and created the first known computer worm. The concept of malware took root in the technology industry, and examples of viruses and worms began appearing on Apple and IBM personal computers in the early 1980s before becoming popular after the introduction of the World Wide Web and of the commercial Internet in the 1990s. Criminals gain access to your computer and find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information and also install a Trojan horse , providing a backdoor for hackers to enter and search your personal information. .CyberbullyingThe potential dangers of the Internet for children and adolescents are not limited to identifying thieves and sexual predators. Cyberbullying and cyberstalking also pose very real threats as more and more children use technology to connect, communicate and socialize. The National Crime Prevention Center estimates that 43% of children have been victims of cyberbullying. This act involves the use of social media, email, cell phone photos, text messages, or instant messages to harass, embarrass, bully, or bully children. The perpetrators in these cases are usually other children or adolescents. This fact has prompted many schools across the country to create policies and commitments intended to address this issue. Cyberbullying is even considered a crime in some regions. As the death of Megan Meier showed, cyberbullying can take place in the online world, but it can have very real and tragic consequences in the online world. To protect themselves against cyberbullying, parents should discuss the topic with their children, taking the time to monitor their messages and online activity. It is also important for parents to ensure that their children do not engage in this activity and that they do not become bystanders to this act by passing on cruel messages sent to them towards others. Keep in mind: this is just a sample. Get a personalized article from our editors now..