Safe use of internet
The most common forms of cyber threats are unauthorized viewing, deletion or modification of data while it is being transmitted, and obtaining personal data and confidential data under the pretext of a trusted institution or person. The means used by cyber thieves and fraudsters to achieve such goals are:
- Viruses and worms: programs that automatically reproduce and spread to other systems via email, causing unauthorised tampering with data;
- Trojans: programs that intercept and record passwords and other confidential information, sending it to a third party;
- Phishing: retrieving passwords and other confidential information through fake websites that (most often) capture genuine pages, tricking users to provide their confidential information;
- Pharming: changing the system settings or infecting servers that direct traffic is unintentionally redirecting the user (despite the correct address) to a fake website. Most often, luring is a means of achieving "fishing";
- Intrusion: unauthorized access to the user's system via the Web.
In practice, in addition to each method, there may also be a combination of methods (e.g. intrusion of PC by means of a virus or Trojan Horse).