0% found this document useful (0 votes)
79 views5 pages

What Is Cybercrime? How To Protect Yourself From Cybercrime

The document discusses cybercrime and cyberbullying. It defines cybercrime as criminal activity that targets or uses computers, networks, or devices. Common types include fraud, identity theft, data theft, and cyberattacks. Cyberbullying involves using technology to harass, threaten, embarrass or target others. The Republic Act 10175 (Cybercrime Prevention Act of 2012) in the Philippines criminalizes cyberlibel and unlawful online acts to help prevent cybercrime and cyberbullying.

Uploaded by

Michaelle Bunao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views5 pages

What Is Cybercrime? How To Protect Yourself From Cybercrime

The document discusses cybercrime and cyberbullying. It defines cybercrime as criminal activity that targets or uses computers, networks, or devices. Common types include fraud, identity theft, data theft, and cyberattacks. Cyberbullying involves using technology to harass, threaten, embarrass or target others. The Republic Act 10175 (Cybercrime Prevention Act of 2012) in the Philippines criminalizes cyberlibel and unlawful online acts to help prevent cybercrime and cyberbullying.

Uploaded by

Michaelle Bunao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

What is cybercrime?

How to protect
yourself from cybercrime

What is cybercrime?
Cybercrime is criminal activity that either targets or uses a computer, a computer
network or a networked device. Most cybercrime is committed by cybercriminals or
hackers who want to make money. However, occasionally cybercrime aims to damage
computers or networks for reasons other than profit. These could be political or
personal.

Cybercrime can be carried out by individuals or organizations. Some cybercriminals are


organized, use advanced techniques and are highly technically skilled. Others are
novice hackers.

What are the types of cybercrime?


Types of cybercrime include:

• Email and internet fraud.


• Identity fraud (where personal information is stolen and used).
• Theft of financial or card payment data.
• Theft and sale of corporate data.
• Cyberextortion (demanding money to prevent a threatened attack).
• Ransomware attacks (a type of cyberextortion).
• Cryptojacking (where hackers mine cryptocurrency using resources they do not
own).
• Cyberespionage (where hackers access government or company data).
• Interfering with systems in a way that compromises a network.
• Infringing copyright.
• Illegal gambling.
• Selling illegal items online.
• Soliciting, producing, or possessing child pornography.

Cybercrime involves one or both of the following:

• Criminal activity targeting computers using viruses and other types of malware.
• Criminal activity using computers to commit other crimes.
Cybercriminals that target computers may infect them with malware to damage devices
or stop them working. They may also use malware to delete or steal data. Or
cybercriminals may stop users from using a website or network or prevent a business
providing a software service to its customers, which is called a Denial-of-Service (DoS)
attack.
Cybercrime that uses computers to commit other crimes may involve using computers
or networks to spread malware, illegal information or illegal images.

Cybercriminals are often doing both at once. They may target computers with viruses
first and then use them to spread malware to other machines or throughout a network.
Some jurisdictions recognize a third category of cybercrime which is where a computer
is used as an accessory to crime. An example of this is using a computer to store stolen
data.

Malware attacks
A malware attack is where a computer system or network is infected with a computer
virus or other type of malware. A computer compromised by malware could be used by
cybercriminals for several purposes. These include stealing confidential data, using the
computer to carry out other criminal acts, or causing damage to data.

Phishing
A phishing campaign is when spam emails, or other forms of communication, are sent
with the intention of tricking recipients into doing something that undermines their
security. Phishing campaign messages may contain infected attachments or links to
malicious sites, or they may ask the receiver to respond with confidential information.

Distributed DoS attacks


Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals use
to bring down a system or network. Sometimes connected IoT (Internet of Things)
devices are used to launch DDoS attacks.

Impact of cybercrime
Generally, cybercrime is on the rise. According to Accenture’s State of Cybersecurity
Resilience 2021 report, security attacks increased 31% from 2020 to 2021. The number
of attacks per company increased from 206 to 270 year on year. Attacks on companies
affect individuals too since many of them store sensitive data and personal information
from customers.

How to protect yourself against cybercrime


Given its prevalence, you may be wondering how to stop cybercrime? Here are some
sensible tips to protect your computer and your personal data from cybercrime:

Keep software and operating system updated


Keeping your software and operating system up to date ensures that you benefit from
the latest security patches to protect your computer.

Use anti-virus software and keep it updated


Using anti-virus or a comprehensive internet security solution like Kaspersky Total
Security is a smart way to protect your system from attacks. Anti-virus software allows
you to scan, detect and remove threats before they become a problem. Having this
protection in place helps to protect your computer and your data from cybercrime, giving
you piece of mind. Keep your antivirus updated to receive the best level of protection.
Use strong passwords
Be sure to use strong passwords that people will not guess and do not record them
anywhere. Or use a reputable password manager to generate strong passwords
randomly to make this easier.
Never open attachments in spam emails
A classic way that computers get infected by malware attacks and other forms of
cybercrime is via email attachments in spam emails. Never open an attachment from a
sender you do not know.

Do not click on links in spam emails or untrusted websites


Another way people become victims of cybercrime is by clicking on links in spam emails
or other messages, or unfamiliar websites. Avoid doing this to stay safe online.

Do not give out personal information unless secure


Never give out personal data over the phone or via email unless you are completely
sure the line or email is secure. Make certain that you are speaking to the person you
think you are.

Contact companies directly about suspicious requests


If you are asked for personal information or data from a company who has called you,
hang up. Call them back using the number on their official website to ensure you are
speaking to them and not a cybercriminal. Ideally, use a different phone because
cybercriminals can hold the line open. When you think you’ve re-dialed, they can
pretend to be from the bank or other organization that you think you are speaking to.

Be mindful of which website URLs you visit


Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on
links with unfamiliar or URLs that look like spam. If your internet security product
includes functionality to secure online transactions, ensure it is enabled before carrying
out financial transactions online.

Keep an eye on your bank statements


Spotting that you have become a victim of cybercrime quickly is important. Keep an eye
on your bank statements and query any unfamiliar transactions with the bank. The bank
can investigate whether they are fraudulent.

A good antivirus will protect you from the threat of cybercrime. Learn more about
Kaspersky Total Security.

Cyberbullying is the use of technology to harass, threaten,


embarrass, or target another person. Online threats and mean,
aggressive, or rude texts, tweets, posts, or messages all count. So
does posting personal information, pictures, or videos designed to hurt
or embarrass someone else.
What Is Cyberbullying
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming where people can view, participate in, or
share content. Cyberbullying includes sending, posting, or sharing negative, harmful,
false, or mean content about someone else. It can include sharing personal or
private information about someone else causing embarrassment or humiliation.
Some cyberbullying crosses the line into unlawful or criminal behavior.

The most common places where cyberbullying occurs are:

• Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok


• Text messaging and messaging apps on mobile or tablet devices
• Instant messaging, direct messaging, and online chatting over the internet
• Online forums, chat rooms, and message boards, such as Reddit
• Email
• Online gaming communities

Special Concerns

With the prevalence of social media and digital forums, comments, photos, posts,
and content shared by individuals can often be viewed by strangers as well as
acquaintances. The content an individual shares online – both their personal content
as well as any negative, mean, or hurtful content – creates a kind of permanent
public record of their views, activities, and behavior. This public record can be
thought of as an online reputation, which may be accessible to schools, employers,
colleges, clubs, and others who may be researching an individual now or in the
future. Cyberbullying can harm the online reputations of everyone involved – not just
the person being bullied, but those doing the bullying or participating in it.
Cyberbullying has unique concerns in that it can be:

Persistent – Digital devices offer an ability to immediately and continuously


communicate 24 hours a day, so it can be difficult for children experiencing
cyberbullying to find relief.

Permanent – Most information communicated electronically is permanent and


public, if not reported and removed. A negative online reputation, including for those
who bully, can impact college admissions, employment, and other areas of life.

Hard to Notice – Because teachers and parents may not overhear or see
cyberbullying taking place, it is harder to recognize.

What is the Republic Act for cyberbullying?


Cybercrime Prevention Act of 2012 (Republic Act No. 10175): This act criminalizes
offenses such as Cyberlibel and Unlawful or Prohibited Acts, which can be relevant to
cyberbullying cases.
What is RA 10175 cybercrime law summary?
In RA 10175, Philippine recognizes the need to protect and safeguard the integrity of
computer, computer and communications systems, networks and databases, and the
confidentiality, integrity, and availability of information and data stored therein from all
forms of misuse, abuse and illegal access by making punishable ..

What is the purpose of the Cybercrime Prevention Act of 2012?


It seeks to prevent cybercrime by providing a legal framework for investigating,
prosecuting, and punishing online offenses. The law covers a wide range of
cybercrimes, including hacking, online fraud, identity theft, cybersex, and child
pornography.

What is the punishment for cyber crime in Philippines?


Under the Cybercrime Prevention Act, any person found guilty of cyber libel may
face imprisonment and fines. The act provides for the following penalties: Imprisonment:
The maximum penalty for cyber libel is imprisonment ranging from six years and one
day to twelve years.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy