0% found this document useful (0 votes)
6 views1 page

Sanchez - It Finals

The document provides an overview of cybercrime, defining it as criminal activities conducted through digital technology that threaten personal data and security. It outlines common cyber threats such as phishing, hacking, and ransomware, along with tips for protection like using strong passwords and enabling multi-factor authentication. Additionally, it references key legislations such as the Cybercrime Prevention Act and the Data Privacy Act aimed at addressing cybercrime and protecting personal information.

Uploaded by

paul.sanchez0425
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views1 page

Sanchez - It Finals

The document provides an overview of cybercrime, defining it as criminal activities conducted through digital technology that threaten personal data and security. It outlines common cyber threats such as phishing, hacking, and ransomware, along with tips for protection like using strong passwords and enabling multi-factor authentication. Additionally, it references key legislations such as the Cybercrime Prevention Act and the Data Privacy Act aimed at addressing cybercrime and protecting personal information.

Uploaded by

paul.sanchez0425
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CYBERCRIME ALERT:

TIPS TO STAY ONE


STEP AHEAD
“Think Before You Click!”

What is Cybercrime? Why is it important?


Cybercrime refers to With the rise of digital
criminal activities carried technology, cybercrime
out using digital endangers personal data,
technology, often disrupts businesses, and
threatens national security,
targeting individuals or
making awareness and
systems online.
prevention crucial.

Common Cyber Threats


Phishing: Fraudulent emails or
messages tricking you into
revealing personal information. 🎣✉️
Hacking: Unauthorized access to
systems or accounts. 🔓💻
Social Engineering: Manipulating
people to give up confidential
information. 🤝🎭
Ransomware: Malware that locks
your data until a ransom is paid. ⚠️🖥️
Identity Theft: Stealing personal
details to impersonate you. 🕵️‍♂️🪪

🔒 Tips to Protect Yourself Key Legislations:


Use Strong Passwords: Combine letters,
numbers, and symbols. Update them RA 10175: Cybercrime
regularly. Prevention Act of 2012
Enable Multi-Factor Authentication Approved on
(MFA): Add an extra layer of security to September 12, 2012,
your accounts. this law aims to
Be Wary of Links and Attachments: Avoid address legal issues
clicking on unknown links or downloading concerning online
files from untrusted sources. interactions and the
Keep Software Updated: Regular updates internet.⚖️🛡️
fix security vulnerabilities.
Secure Wi-Fi Networks: Use strong RA 10173: Data
passwords and avoid public Wi-Fi for Privacy Act of 2012
sensitive tasks. An act protecting
Backup Data Regularly: Use secure cloud individual personal
storage or external drives. information. 🔐📜
Call to Action
"Together, We Can Combat Cybercrime!"
Encourage people to spread awareness
and stay informed.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy