0% found this document useful (0 votes)
0 views

Lesson4_Cybercrimes

Uploaded by

syndraviktor6
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Lesson4_Cybercrimes

Uploaded by

syndraviktor6
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 45

GEED-20133

Living in the IT Era

Lesson 4
Cyber Crimes , Netiquettes
& Internet Threats
OVERVIEW

Cybercrime law includes laws related


to computer crimes, internet crimes,
information crimes, communications
crimes, and technology crimes. While the
internet and the digital economy represent a
significant opportunity, they’re also an
enabler for criminal activity.
Learning Outcomes:
 Discuss the cybercrime concept
 Explain the cyber crime law
 Discuss the important of cyber crime law
 Identify the different types Cybercrimes
 Formulate solutions to solve cybercrime
 Discuss the important of Netiquettes
 Recite the Ten Commandments of Computer
Ethics
 Discuss the significance of Internet Threats
What is Cyber?
It is the Characteristics of the culture of
computers, information, technology and virtual reality.
The crime that involves and uses computer devices and
Internet, is known as cybercrime.
Cybercrime can be committed against an
individual or a group; it can also be committed against
government and private organizations. It may be
intended to harm someone’s reputation, physical harm,
or even mental harm.
The crime that involves and
uses computer devices and
Internet, is known as
cybercrime.
Cybercrime can be committed
against an individual or a
group; it can also be committed
against government and private
organizations. It may be
intended to harm someone’s
reputation, physical harm, or
even mental harm.
Cybercrime can cause direct harm or indirect harm
to whoever the victim is.
However, the largest threat of cybercrime is on the
financial security of an individual as well as the
government.
Cybercrime causes loss of billions of USD every
year.
Example of a cyber crime
Cybercrime, also called computer crime, the use of a
computer as an instrument to further illegal ends, such as
committing fraud, trafficking in child pornography and
intellectual property, stealing identities, or violating
privacy.
Cybercrime laws in the Philippines
Republic Act No. 10175, or the Cybercrime
Prevention Act of 2012, was signed into law by
President Aquino on Sept. 12, 2012. Its original
goal was to penalize acts like cybersex, child
pornography, identity theft and unsolicited
electronic communication in the country.
Top 5 Popular Cybercrimes to Effortlessly Protect
Your Computer and Data Against its Impact
1. Phishing: using fake email messages to get
personal information from internet users;
2. Misusing personal information (identity theft);
3. Hacking: shutting down or misusing websites or
computer networks;
4. Spreading hate and inciting terrorism;
5. Distributing child pornography;
Other Types of Cybercrime
Hacking
It is an illegal practice by which a hacker
breaches the computer’s security system of
someone for personal interest.
Unwarranted mass-surveillance
Mass surveillance means surveillance of a
substantial fraction of a group of people by the
authority especially for the security purpose,
but if someone does it for personal interest, it
is considered as cybercrime.
Child pornography
It is one of the most heinous crimes that is brazenly
practiced across the world. Children are sexually abused
and videos are being made and uploaded on the Internet.
Child Grooming
It is the practice of establishing an emotional connection
with a child especially for the purpose of child-trafficking
and child prostitution.
Copyright infringement
If someone infringes someone’s protected copyright
without permission and publishes that with his own name,
is known as copyright infringement.
Money laundering
Illegal possession of money by an individual or an
organization is known as money laundering. It typically
involves transfers of money through foreign banks and/or
legitimate business. In other words, it is the practice of
transforming illegitimately earned money into the
legitimate financial system.
Cyber-extortion
When a hacker hacks someone’s email server or computer system and
demands money to reinstate the system, it is known as cyber-
extortion.
Cyber-terrorism
Normally, when someone hacks government’s security system or
intimidates government or such a big organization to advance his
political or social objectives by invading the security system through
computer networks, it is known as cyber-terrorism.
Cyber Security
Cyber security is a potential activity by which information and other
communication systems are protected from and/or defended against
the unauthorized use or modification or exploitation or even theft.
All sorts of data whether it is government,
corporate, or personal need high security; however,
some of the data, which belongs to the government
defense system, banks, defense research and
development organization, etc. are highly
confidential and even small amount of negligence
to these data may cause great damage to the whole
nation. Therefore, such data need security at a very
high level.
How to Secure Data?
Let us now discuss how to secure data. In order to make your security system
strong, you need to pay attention to the following:
1. Security Architecture
2. Network Diagram
3. Security Assessment Procedure
4. Security Policies
5. Risk Management Policy
6. Backup and Restore Procedures
7. Disaster Recovery Plan
8. Risk Assessment Procedures
Once you have a complete blueprint of the points mentioned above, you can put
better security system to your data and can also retrieve your data if something
goes wrong.
Netiquette

In any given social situation, be it in a classroom or a


party, a person without proper etiquette is little
appreciated. The offender may elicit a laugh or two, but
it gets tiresome to be around a person who has no respect
for rules. Eventually, the wrong doer begins to be
annoying and more so frustrating to be with. You don’t
want to be one of those people. Yet you just might be
one when you are on the net.
Netiquette refers to etiquette on the internet.
Good netiquette is based on respect for other net
users. It is avoiding online actions that will annoy
or frustrate other people. One indicator that you
have bead etiquette is when you send or flood
people with unwelcome e-mail, or spam.
The basic rule is “to treat people the way you would
want to be treated.” Be polite to anyone you meet.
Being hidden behind a fancy username gives you no
right to insult or mock people. Always put yourself “in
the shoes of the other person” before you even begin
writing up your comment, as it may be inappropriate
and hurtful to others. Use emoticons to show your
tone or emotion. You may not see whom you are
chatting with, but there is a person on the other end of
line. If you wouldn’t say it to them face to face,
chances are you shouldn’t say it online either.
In the area of typing, almost everybody knows that
writing in uppercase letters makes it look
“YOU’RE SHOUTING”. Refrain from typing more
than two or three consecutive words, in uppercase
letters. If you want to stress a point, use HTML
options, “quotation marks” or “asterisks* on your
text.

The following are additional lists of netiquette in


using the email.
1. Be concise and direct to the point

Do not make an e-mail longer than it needs to be.


Remember that reading an e-mail is harder than reading
printed communications and a long e-mail can be very
discouraging to read.

22
2. Use proper spelling, grammar and punctuation

This is not only important because improper


spelling, grammar and punctuation give a bad
impression of you. It is also important for conveying
the message properly. E-mails with no full stops, or
commas are difficult to read and can sometimes even
change the meaning of the text.
3. Do not attach unnecessary files

By sending large attachments you can annoy people.


Wherever possible try to compress attachments and only
send attachments when they are productive.
4. Use proper structure and layout

Since reading from a screen is more difficult than


reading from paper, the structure and lay out is
very important for e –mail messages. Use short
paragraphs and blank lines between each
paragraph. When making points, number them or
mark each point as separate to keep the overview.
5. Read the email before you send it

A lot of people don’t bother to read an email


before they send it out, as can be seen from the
many spelling and grammar mistakes contained in
emails. Apart from this, reading your email
through the eyes of the recipient will help you
send a more effective message and avoid
misunderstandings and inappropriate comments.
6. Do not copy a message or attachment
without permission

Do not copy a message or attachment belonging to


another user without permission of the originator.
If you do not ask permission first, you might be
infringing on copyright laws.
7. Do not use email to discuss confidential
information

Sending an email is like sending a postcard. If you


don’t want your email to be displayed on a bulletin
board, don’t send it. Moreover, never make any
libelous or racially discriminating comments in
emails, even if they are meant to be a joke.
8. Don’t forward virus hoaxes and chain letters

If you receive an email message warning you of a new unstoppable


virus that will immediately delete everything from your computer,
this is most probably a hoax.

Since it is impossible to find out whether a chain letter is real or


not, the best place for it is recycle bin.
9. Don’t send or forward emails containing libelous, defamatory,
offensive, racist or obscene remarks

By sending or just forwarding one libelous, or offensive remark in an


email, you can face court cases resulting in multi million pesos
penalties.
10. Use cc: field sparingly

Try not to use the cc: filed unless the recipient in the cc:
field knows why they are receiving a copy of the messages.
Internet Threats
Email Spam
Email spam, also known as junk email, is unsolicited
bulk messages sent through email. The use of spam has been
growing in popularity since the early 1990s and is a problem
faced by most email users. Recipients of spam often have
had their email addresses obtained by spambots, which are
automated programs that crawl the internet looking for
email addresses. Spammers use spambots to create email
distribution lists. A spammer typically sends an email to
millions of email addresses, with the expectation that only a
small number will respond or interact with the message.
Dangers on the Internet
The term spam is derived from a famous Monty Python sketch in
which there are many repetitive iterations of the Hormel canned meat
product. While the term spam was reportedly first used to refer to
unwanted email as early as 1978, it gained more widespread
currency in the early 1990s, as internet access became more common
outside of academic and research circles.
Email Spoofing

Email spoofing is the fabrication of an email header in the


hopes of duping the recipient into thinking the email
originated from someone or somewhere other than the
intended source. Because core email protocols do not have
a built-in method of authentication, it is commonplace for
spam and phishing emails to use said spoofing to trick the
recipient into trusting the origin of the message.
Email Spoofing

Email spoofing is the fabrication of an email header in the


hopes of duping the recipient into thinking the email
originated from someone or somewhere other than the
intended source. Because core email protocols do not have
a built-in method of authentication, it is commonplace for
spam and phishing emails to use said spoofing to trick the
recipient into trusting the origin of the message.
Phishing

Phishing is a type of social engineering attack often used


to steal user data, including login credentials and credit
card numbers. It occurs when an attacker, masquerading as
a trusted entity, dupes a victim into opening an email,
instant message, or text message. The recipient is then
tricked into clicking a malicious link, which can lead to the
installation of malware, the freezing of the system as part
of a ransom ware attack or the revealing of sensitive
information
Pharming

Pharming is a type of social engineering cyber-


attack in which criminals redirect internet users trying to
reach a specific website to a different, fake site. These
“spoofed” sites aim to capture a victim’s personally
identifiable information (PII) and log-in credentials, such
as passwords, social security numbers, account numbers,
and so on, or else they attempt to install pharming malware
on their computer. Pharmers often target websites in the
financial sector, including banks, online payment
platforms, or e-commerce sites, usually with identity
theft as their ultimate objective.
Spyware

Spyware is loosely defined as malicious software designed


to enter your computer device, gather data about you, and
forward it to a third-party without your consent. Spyware
can also refer to legitimate software that monitors your
data for commercial purposes like advertising. However,
malicious spyware is explicitly used to profit from stolen
data.
Computer Worm

A computer worm is a type of malware that spreads copies


of itself from computer to computer. A worm can replicate
itself without any human interaction, and it does not need
to attach itself to a software program in order to cause
damage.
Trojan Horse

The term “Trojan” derives from the ancient Greek story


about the deceptive Trojan horse which led to the fall of
the city of Troy. When it comes to your computer, a
Trojan virus operates similarly – it hides within seemingly
harmless programs or tries to trick you into downloading
it. The name was coined in a US Air Force report in 1974,
which speculated on hypothetical ways computers could
be compromised.
Computer Virus
A computer virus is a malicious piece of computer code
designed to spread from device to device. A subset of
malware, these self-copying threats are usually designed to
damage a device or steal data.
Hacker
A computer hacker is a computer expert who uses
their technical knowledge to achieve a goal or overcome
an obstacle, within a computerized system by non-standard
means. Though the term hacker has become associated
in popular culture with a security hacker – someone who
utilizes their technical know-how of bugs or exploits to
break into computer systems and access data which would
otherwise be unavailable to them – hacking can also be
utilized by legitimate figures in legal situations. For
example, law enforcement agencies sometimes use
hacking techniques in order to collect evidence on
criminals and other malicious actors.
Activity # 4.1
Define the Following crimes in your own words the way
you understand.
Online Impersonation
Social Network Fraud
Cyberbullying
End of Chapter 1
Trafficking Passwords
Cyber Extortion
Creating or Possessing Child Pornography
Identity Theft
Unauthorized System Access
Activity # 4.2
Choose of Two (2) Cases which are relevant to the
Cybercrimes commonly happened here in our country.
Give Solutions to those cases you have chosen. Use this
format for your study.
End of Chapter 1
Title of the Case Study
Introduction
Solutions
Conclusions
Recommendations
Activity # 4.3

1.Search the 10 Commandments of Computer Ethics


2.Record your voice reciting the 10 commandments of
Computer Ethics
3.Create a posterEnd
designof Chapter
using powerpoint1 for the 10
Commandments of Computer Ethics.
4.Save your Work in our google drive.

You might also like