Topic > Overview of common Internet threats

IndexMalwareHackingCyberbullyingPhishingMalwareThis is malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. What this does is intimidate your scareware, which is usually a pop-up message telling you that your computer has security problems or other false information. They can alter your computer and reformat your hard drive causing you to lose important information. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay They can alter your computer and reformat your hard drive causing you to lose important information. Wholeheartedly take control of your computer and all software running on it. One of the first known examples of malware was the Creeper virus in 1971, created as an experiment by BBN Technologies engineer Robert Thomas. Creeper was designed to infect mainframes on the ARPANET. Although the program did not alter functions, or steal or delete data, the program moved from one mainframe to another without authorization while displaying a teletype message that read, "I am the creeper: catch me if you can." Creeper was later modified by computer scientist Ray Tomlinson, who added the ability to self-replicate to the virus and created the first known computer worm. The concept of malware has taken root in the technology sector and examples of viruses and worms began appearing on Apple and IBM personal computers in the early 1980s before becoming popular following the introduction of the World Wide Web and the Internet commercial in the 1990s.Hacking Criminals gain access to your computer and find weaknesses (or pre-existing bugs) in your security settings and exploit them to access your information and also install a Trojan horse, providing a backdoor for them to hackers can come in and look for your personal information. Cyberbullying The potential dangers of the Internet for children and adolescents are not limited to identifying thieves and sexual predators. Cyberbullying and cyber stalking also pose real threats as more and more children use technology to connect, communicate and socialize. The National Center for Crime Prevention estimates that 43% of children have experienced cyberbullying. This act involves using social media, emails, cell phone photos, text messages, or instant messages to harass, embarrass, intimidate, or bully children. The perpetrators in these cases are generally other children or adolescents. This fact has given rise to many schools across the country creating policies and commitments aimed at addressing the problem. In some areas, cyberbullying is even considered a crime. As Megan Meier's death demonstrated, cyberbullying can happen in the online world, but it can have real and tragic consequences in the online world. To protect themselves from cyberbullying, parents should discuss the topic with their children and take the time to monitor their messages and online activity. It is also important for parents to ensure that their children do not engage in this activity and that they do not become spectators of the act by conveying cruel messages that are sent towards others. Please note: this is just an example. Get a custom paper from our expert writers now. Get a Custom Essay Phishing These are fake emails, text messages, and websites created to appear to be from genuine companies. They are sent by criminals to steal your personal and financial information. This is also known as “spoofing”. They can trick you into giving them information by asking you to.