Chap 3 Ethics in Information Technology
Chap 3 Ethics in Information Technology
INFORMATIO
N
TECHNOLOG
GEE LIE - Living in the IT Era
CybercrimeE
refers to illegal activities
conducted using computers,
networks, the internet, or the
ICT
Cybercriminals
are individuals or groups who
engage in cybercrime, using
technology to exploit, harm, or
steal from others
Cybercrime Law
are laws that create
offences and penalties for
cybercrimes:
• computer crimes,
• internet crimes,
• information crimes,
• communications
crimes,
• technology crimes.
GEE LIE - Living in the IT Era
CYBERCRIME LAW IN THE
PHILIPPINES
GEE LIE - Living in the IT Era
HOW TO
AGAINST
PROTECT
YOURSELF
1 Avoid using public networks.
Larana University | 2024
1 Patent
2 Trademark
3 Trade Secret
4 Copyright
Patent
GEE LIE - Living in the IT Era
k A trademark is a symbol,
word, phrase, logo, or design
that identifies and represents
a specific brand, product, or
service. It helps people
recognize the source of goods
or services and sets them
apart from competitors.
Trademar
GEE LIE - Living in the IT Era
1 Patent Infringement
Happens when a person or company makes,
uses, sells, or imports a patented invention
without authorization from the patent holder.
2 Trademark Infringement
Involves using a trademark (a brand name, logo,
or symbol) that is identical or confusingly similar
to a registered trademark, causing confusion
among consumers.
4 Copyright Infringement
Occurs when someone reproduces, distributes,
performs, or displays copyrighted works (like
books, music, movies, software, etc.) without
permission from the copyright holder.
PHISHING
is a type of cybercrime in which
attackers attempt to trick individuals into
revealing sensitive information, such as
usernames, passwords, credit card numbers,
or other personal data. This is usually done by
pretending to be a legitimate entity, such as a
bank, company, or trusted service, through
deceptive emails, messages, or websites.
Phishing
GEE LIE - Living in the IT Era
tactics:
Email Phishing:
Fraudulent emails that appear to come from trusted
sources, asking recipients to click on links or open
attachments that contain malware or lead to fake
websites.
Spear Phishing
A more targeted form of phishing where attackers
customize their messages to specific individuals or
organizations, often using personal information to make
the scam more convincing.
Phishing
GEE LIE - Living in the IT Era
tactics:
Smishing
Phishing via SMS or text messages, tricking users into
clicking malicious links or sharing sensitive data.
Vishing
Phishing done over the phone, where scammers pose as
legitimate organizations to steal personal information.
HOW TO PROTECT
YOURSELF FROM PHISHING
GEE LIE - Living in the IT Era
ATTACKS?
• Always verify the sender's identity,
• Avoid clicking on suspicious links,
and
• Check for signs of authenticity
(such as website URLs and
spelling errors
OTHER SAFETY MEASURES
GEE LIE - Living in the IT Era
• Black hat
• Gray hat
• White hat
Black Hat
GEE LIE - Living in the IT Era
• Application
Security
• Information
Security
• Network Security
• Disaster Recovery
Planning
Application
Focusing
Security on the security of software
GEE LIE - Living in the IT Era
Information
Security
Ensuring the confidentiality, integrity, and
availability of data both in transit and at rest.
This includes securing databases, sensitive
files, and communication protocols.
Network Security
Protecting network infrastructure from
GEE LIE - Living in the IT Era