The document provides an overview of cybercrime, defining it as criminal activities conducted through digital technology that threaten personal data and security. It outlines common cyber threats such as phishing, hacking, and ransomware, along with tips for protection like using strong passwords and enabling multi-factor authentication. Additionally, it references key legislations such as the Cybercrime Prevention Act and the Data Privacy Act aimed at addressing cybercrime and protecting personal information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views1 page
Sanchez - It Finals
The document provides an overview of cybercrime, defining it as criminal activities conducted through digital technology that threaten personal data and security. It outlines common cyber threats such as phishing, hacking, and ransomware, along with tips for protection like using strong passwords and enabling multi-factor authentication. Additionally, it references key legislations such as the Cybercrime Prevention Act and the Data Privacy Act aimed at addressing cybercrime and protecting personal information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
CYBERCRIME ALERT:
TIPS TO STAY ONE
STEP AHEAD “Think Before You Click!”
What is Cybercrime? Why is it important?
Cybercrime refers to With the rise of digital criminal activities carried technology, cybercrime out using digital endangers personal data, technology, often disrupts businesses, and threatens national security, targeting individuals or making awareness and systems online. prevention crucial.
Common Cyber Threats
Phishing: Fraudulent emails or messages tricking you into revealing personal information. 🎣✉️ Hacking: Unauthorized access to systems or accounts. 🔓💻 Social Engineering: Manipulating people to give up confidential information. 🤝🎭 Ransomware: Malware that locks your data until a ransom is paid. ⚠️🖥️ Identity Theft: Stealing personal details to impersonate you. 🕵️♂️🪪
🔒 Tips to Protect Yourself Key Legislations:
Use Strong Passwords: Combine letters, numbers, and symbols. Update them RA 10175: Cybercrime regularly. Prevention Act of 2012 Enable Multi-Factor Authentication Approved on (MFA): Add an extra layer of security to September 12, 2012, your accounts. this law aims to Be Wary of Links and Attachments: Avoid address legal issues clicking on unknown links or downloading concerning online files from untrusted sources. interactions and the Keep Software Updated: Regular updates internet.⚖️🛡️ fix security vulnerabilities. Secure Wi-Fi Networks: Use strong RA 10173: Data passwords and avoid public Wi-Fi for Privacy Act of 2012 sensitive tasks. An act protecting Backup Data Regularly: Use secure cloud individual personal storage or external drives. information. 🔐📜 Call to Action "Together, We Can Combat Cybercrime!" Encourage people to spread awareness and stay informed.