0% found this document useful (0 votes)
16 views29 pages

Module 4 Powerpoint for GEED 20133

The document provides an overview of cybercrimes, defining cybercrime as offenses involving computers, such as hacking, phishing, and child pornography. It outlines various forms of cybercrimes, including copyright infringement, computer addiction, and cyberbullying, along with relevant laws in the Philippines like the Cybercrime Prevention Act of 2012. Additionally, it discusses common internet threats like malware, phishing, and ransomware, detailing their impacts and methods of prevention.

Uploaded by

eunicedeleonpup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views29 pages

Module 4 Powerpoint for GEED 20133

The document provides an overview of cybercrimes, defining cybercrime as offenses involving computers, such as hacking, phishing, and child pornography. It outlines various forms of cybercrimes, including copyright infringement, computer addiction, and cyberbullying, along with relevant laws in the Philippines like the Cybercrime Prevention Act of 2012. Additionally, it discusses common internet threats like malware, phishing, and ransomware, detailing their impacts and methods of prevention.

Uploaded by

eunicedeleonpup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

MODULE 4

Lesson 2: Cybercrimes
What is CYBER?
 It is relating to or characteristics of the culture
of computers, information, technology and
virtual reality—Oxford Languages

 Relating to, or involving computers or computer


networks (such as the Internet)—Merriam-
Webster

 Involving, using, or relating to computers,


especially the internet—Cambridge Dictionary
 Cybercrime is defined as a
crime in which a computer
is the object of the crime
(hacking, phishing,
spamming and child
pornography) is used as a
tool to commit an offense.
 Cybercriminals may use
computer technology to
access personal information,
business trade secrets or
use the internet for
exploitative or malicious
 Republic Act No. 10175
Cybercrime Prevention Act of
2012 is a law in the
Philippines approved on
September 12,2012 which
aims to address legal issues
concerning online
interactions and internet.
 Republic Act No. 10173 Data
Privacy Act of 2012 is an act
protecting individual
personal information.
COMMON FORMS OF CYBERCRIMES:
a. Copyright infringement is the
Copyright violation, piracy or theft of a
copyright holder's exclusive
The rights through the
exclusive unauthorized use of a
legal right, copyrighted material or work.
given to an
originator or
an assignee
perform,
to print, film, or record
literary, artistic, or musical
publish,
material, and to authorize
others to do the same.
b. Plagiarism An act or instance of
using or closely imitating the language
and thoughts of another author without
authorization.
c. Computer Addiction can
be defined as the excessive or
compulsive use of the computer which
persists despite serious negative
consequences for personal, social, or
occupational function.
There are two types of computer
addition, namely offline and online
computer addiction. Offline computer
addiction is normally used when
speaking about excessive gaming
behavior, which can be practiced both
CRIMINAL ACTIVITIES
a. Hacking
 Unauthorized access of or
interference with computer
systems, servers, or other
information and
communication systems
 Unauthorized access to
corrupt, alter, steal, or destroy
electronic data using  The introduction of
computers or other computer viruses resulting
information and in the corruption,
communication systems alteration, theft, or loss of
without the computer or such data.
system owner’s knowledge
 Illegal Access

 Illegal Interception

 Data Interference

 System Interference

 Misuse of Devices

 Infection of IT Systems with


Malware – if the act is
committed against critical
infrastructure of the  Six years up to twelve years
Philippines, the penalty is of imprisonment also known
between 12-20 years as prison mayor.
reclusion temporal
b. Computer-related
forgery, fraud and/or
identity theft
• An attempt to obtain
sensitive information such
as usernames, passwords,
and credit card details and
(indirectly money), often for
malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php
c. Electronic theft
 Illegal Downloading
 Obtaining files that you
do not have the right to
use from the internet.
 Digital Piracy
 Practice of illegally
copying and selling
digital music, video,
computer software, etc.
Copyright Infringement
Penalty of Php 50,000 –
500,000 and or prison
mayor
d. Cyberbullying e. Cybersex
The use of electronic Willful
communication to bully a engagement,
person, typically maintenance,
by sending a message of an control, or
intimidating or threatening operation,
nature. directly or indirectly of any
lascivious exhibition of sexual
The Anti-Bullying Act of 2013 organs or sexual activity with the
(RA 10627). aid of a computer system for
favor or consideration.
There is a discussion on this
matter if it involves “couples” or
“people in relationship” who
engage in cybersex. Penalty at
f. Child Pornography
Is a form of child sexual
exploitation
Unlawful or prohibited acts defined
and punishable by Republic Act
No. 9775 or the AntiChild
Pornography Act of 2009,
committed through a computer
system. g. Cyber Defamation
Penalty of 12-20 years of Is an unprivileged false
imprisonment or reclusion statement of fact which
temporal tends to harm the reputation
of a person or company.
Penalty of 6-12 years of
imprisonment or prison
LESSON 3:
INTERNET THREATS
Hacking
Hacking is a term used
to describe actions taken by
someone to gain
unauthorized access to a
computer. The availability of
information online on the What it can do:
tools, techniques, and  Find weaknesses (or pre-
malware makes it easier for existing bugs) in your security
even non-technical people settings and exploit them in
to undertake malicious order to access your
activities. The process by information.
which cyber criminals gain  Install a Trojan horse, providing
access to your computer.. a back door for hackers to enter
Malware
Malware is one of the more
common ways to infiltrate or
damage your computer.
Malicious software that infects
your computer, such as
computer viruses, worms,
Trojan horses, spyware, and • Reformat the hard drive of
adware. your computer causing you to
lose all your information.
What it can do: • Alter or delete files.
• Intimidate you with
scareware, which is usually a • Steal sensitive information.
pop-up message that tells you • Send emails on your behalf.
your computer has a security • Take control of your computer
problem or other false and all the software running on
Pharming
Pharming is a common type
of online fraud. A means to
point you to a malicious and
illegitimate website by
redirecting the legitimate
URL. What it can do:
• Convince you that the site is real
Even if the URL is entered and legitimate by spoofing or
correctly, it can still be looking almost identical to the
redirected to a fake website. actual site down to the smallest
details.
You may enter your personal
information and unknowingly give
it to someone with malicious
Phishing
Phishing is used most often
by cyber criminals because
it's easy to execute and can
produce the results they're
looking for with very little What it does:
effort. * Trick you into giving them
information by asking you to update,
Fake emails, text messages validate or confirm your account.
and websites created to * It is often presented in a manner that
look like they're from seems official and intimidating, to
authentic companies. encourage you to take action.
* Provides cyber criminals with your
They're sent by criminals to
username and passwords so that they
steal personal and financial can access your accounts (your online
information from you. This is bank account, shopping accounts,
also known as “spoofing”. etc.) and steal your credit card
Ransomware
Ransomware is a type of
malware that restricts access What it can do:
to your computer or your files There are two
and displays a message that common types of
demands payment in order ransomware:
for the restriction to be Lockscreen ransomware: displays
removed. an image that prevents you from
accessing your computer
The two most common Encryption ransomware: encrypts
means of infection appear to files on your system's hard drive
be phishing emails that and sometimes on shared network
contain malicious drives, USB drives, external hard
attachments and website drives, and even some cloud
pop-up advertisements. storage drives, preventing you
from opening them.
Ransomware will display a
notification stating that your
computer or data have been
locked and demanding a
payment be made for you to
regain access.

Sometimes the notification


states that authorities have
detected illegal activity on What you can do:
your computer, and that the Do not pay the ransom.
payment is a fine to avoid These threats are meant to
prosecution. scare and intimidate you, and
they do not come from a law
enforcement agency.
Even if you submit
payment, there is no
guarantee that you will
regain access to your
system.
If your computer has been
infected (i.e. you are
unable to access your
computer or your files In order to lessen the impact of a
have been encrypted), ransomware infection, be sure to
contact a reputable regularly back-up your data with a
computer technician or removable external storage drive.
specialist to find out It's possible that your files might
whether your computer be irretrievable; having an up-to-
can be repaired and your date backup could be invaluable.
Spam
Spam is one of the more What it can do:
common methods of both • Annoy you with
sending information out and unwanted junk mail.
collecting it from unsuspecting
• Create a burden
people.
for communications service
The mass distribution of providers and businesses to
unsolicited messages, filter electronic messages.
advertising or pornography to • Phish for your information by
addresses which can be easily tricking you into following links
found on the Internet through or entering details with too-good
things like social networking to-be-true offers and
sites, company websites and promotions.
personal blogs. • Provide a vehicle for malware,
scams, fraud and threats to your
Spyware (Spyware & Adware)
Spyware and adware are What it can do:
often used by third parties • Collect information
to infiltrate your computer. about you without you
What it is: Software that knowing about it and
collects personal information give it to third parties.
about you without you • Send your usernames, passwords,
knowing. surfing habits, list of applications
you've downloaded, settings, and even
They often come in the form the version of your operating system to
of a ‘free' download and are third parties.
installed automatically with • Change the way your computer runs
or without your consent. without your knowledge.
These are difficult to remove • Take you to unwanted sites or
and can infect your inundate you with uncontrollable pop-
Trojan Horses
A Trojan horse may not be
a term you're familiar with,
but there's a good chance
What it can do:
you or someone you know
• Delete your files.
has been affected by one.
• Use your computer to hack
A malicious program that is other computers.
disguised as, or embedded • Watch you through your web
within, legitimate software. cam.
It is an executable file that • Log your keystrokes (such as
will install itself and run a credit card number you
automatically once it's entered in an online
downloaded. purchase).
• Record usernames,
Viruses
Most people have heard of
computer viruses, but not
many know exactly what
they are or what they do.
Malicious computer
programs that are often What they can do:
sent as an email • Send spam.
attachment or a download • Provide criminals with
with the intent of infecting access to your computer and
your computer, as well as contact lists.
the computers of everyone
• Scan and find personal
in your contact list. Just
information like passwords on
visiting a site can start an
your computer.
automatic download of a
Hijack your web browser.
Disable your security settings.
Display unwanted ads.
When a program is running, How will you know if your
the virus attached to it could computer is infected? Here
infiltrate your hard drive and are a few things to check
also spread to USB keys and for:
external hard drives. Any It takes longer than usual for
attachment you create using your computer to start up, it
this program and send to restarts on its own or doesn't
someone else could also start up at all.
infect them with the virus. It takes a long time to launch
 Files and data have
disappeared.
 Your system and programs
crash constantly.
 The homepage you set on your
web browser is different (note
that this could be caused by
Adware that has been installed
on your computer).  If you suspect a problem,
 Web pages are slow to load. make sure your security
software is up to date and
 Your computer screen looks
run it to check for
distorted. infection. If nothing is
 Programs are running without found, or if you are
your control. unsure of what to do,
Wi-Fi Eavesdropping
WiFi eavesdropping is another
method used by cyber criminals
to capture personal information.
Virtual “listening in” on
information that's shared over an
unsecure (not encrypted) WiFi
network.

What it can do:


• Potentially access your
computer with the right
equipment.
• Steal your personal information
including logins and passwords.
Worms
Worms are a common threat
to computers and the
Internet as a whole. A worm,
unlike a virus, goes to work
on its own without attaching
itself to files or programs. It What they can do:
lives in your computer Spread to everyone in your
memory, doesn't damage or contact list.
alter the hard drive and
Cause a tremendous amount of
propagates by sending itself
damage by shutting down
to other computers in a
parts of the Internet, wreaking
network – whether within a
havoc on an internal network
company or the Internet
and costing companies’
itself.
enormous amounts of lost
Thank You!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy