0% found this document useful (0 votes)
4 views

Module 4

Uploaded by

fvfwmy6mqm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Module 4

Uploaded by

fvfwmy6mqm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Module 4

Lesson 2: Cybercrimes
What is Cyber?
It is relating to or characteristics of the culture of
computers, information, technology and virtual reality—
Oxford Languages

Relating to, or involving computers or computer networks


(such as the Internet)—Merriam-Webster

Involving, using, or relating to computers, especially the


internet—Cambridge Dictionary
Cybercrime is defined as a crime in
which a computer is the object of
the crime (hacking, phishing,
spamming and child pornography)
is used as a tool to commit an
offense.
Cybercriminals may use computer
technology to access personal
information, business trade secrets
or use the internet for exploitative
or malicious purposes.
Republic Act No. 10175 Cybercrime
Prevention Act of 2012 is a law in the
Philippines approved on September
12,2012 which aims to address legal
issues concerning online interactions
and internet.
Republic Act No. 10173 Data Privacy
Act of 2012 is an act protecting
individual personal information.
COMMON FORMS OF CYBERCRIMES:
a. Copyright Copyright infringement is the
violation, piracy or theft of a
The exclusive copyright holder's exclusive rights
legal right, through the unauthorized use of a
given to an copyrighted material or work.
originator or an
assignee to
print, publish,
perform, film, or record literary,
artistic, or musical material, and to
authorize others to do the same.
b. Plagiarism An act or instance of using or closely
imitating the language and thoughts of another
author without authorization.
c. Computer Addiction can be defined as the
excessive or compulsive use of the computer which
persists despite serious negative consequences for
personal, social, or occupational function.
There are two types of computer addition,
namely offline and online computer addiction.
Offline computer addiction is normally used when
speaking about excessive gaming behavior, which
can be practiced both offline and online.
CRIMINAL ACTIVITIES
a. Hacking
Unauthorized access of or
interference with computer
systems, servers, or other
information and communication
systems
Unauthorized access to corrupt,
alter, steal, or destroy electronic
data using computers or other The introduction of
information and communication computer viruses resulting
systems without the computer or in the corruption, alteration,
system owner’s knowledge and theft, or loss of such data.
consent.
Illegal Access
Illegal Interception
Data Interference
System Interference
Misuse of Devices
Infection of IT Systems with
Malware – if the act is committed
against critical infrastructure of
the Philippines, the penalty is
between 12-20 years reclusion
temporal
Six years up to twelve years of
imprisonment also known as prison
mayor.
b. Computer-related forgery,
fraud and/or identity theft
• An attempt to obtain
sensitive information such as
usernames, passwords, and
credit card details and (indirectly
money), often for malicious
reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000
fine or prison mayor
c. Electronic theft

Illegal Downloading
Obtaining files that you do
not have the right to use
from the internet.
Digital Piracy
Practice of illegally copying
and selling digital music,
video, computer software,
etc.
Copyright Infringement
Penalty of Php 50,000 –
500,000 and or prison mayor
d. Cyberbullying e. Cybersex
The use of electronic
communication to bully a person, Willful engagement,
typically by sending a message of maintenance, control,
an intimidating or threatening or operation,
nature. directly or indirectly of any lascivious
exhibition of sexual organs or sexual
The Anti-Bullying Act of 2013
activity with the aid of a computer
(RA 10627).
system for favor or consideration.
There is a discussion on this matter if it
involves “couples” or “people in
relationship” who engage in cybersex.
Penalty at least Php 200,000 and or
prison mayor.
f. Child Pornography
Is a form of child sexual exploitation
Unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or
the AntiChild Pornography Act of 2009,
committed through a computer system.
Penalty of 12-20 years of imprisonment
or reclusion temporal
g. Cyber Defamation
Is an unprivileged false statement
of fact which tends to harm the
reputation of a person or company.

Penalty of 6-12 years of


imprisonment or prison mayor.
Lesson 3:
Internet Threats
Hacking

Hacking is a term used to


describe actions taken by someone
to gain unauthorized access to a
computer. The availability of
information online on the tools,
techniques, and malware makes it What it can do:
easier for even non-technical Find weaknesses (or pre-existing
people to undertake malicious bugs) in your security settings and
activities. The process by which exploit them in order to access your
cyber criminals gain access to your information.
computer.. Install a Trojan horse, providing a
back door for hackers to enter and
search for your information
Malware
Malware is one of the more common
ways to infiltrate or damage your
computer. Malicious software that
infects your computer, such as
computer viruses, worms, Trojan
horses, spyware, and adware.
• Reformat the hard drive of your
What it can do: computer causing you to lose all your
• Intimidate you with scareware, information.
which is usually a pop-up message • Alter or delete files.
that tells you your computer has a • Steal sensitive information.
security problem or other false • Send emails on your behalf.
information. • Take control of your computer and
all the software running on it.
Pharming
Pharming is a common type of
online fraud. A means to point you
to a malicious and illegitimate
website by redirecting the
legitimate URL.
What it can do:
Even if the URL is entered • Convince you that the site is real and
correctly, it can still be redirected legitimate by spoofing or looking almost
to a fake website. identical to the actual site down to the
smallest details.
You may enter your personal information
and unknowingly give it to someone with
malicious intent.
Phishing
Phishing is used most often by
cyber criminals because it's easy
to execute and can produce the
results they're looking for with
very little effort. What it does:
* Trick you into giving them information by
Fake emails, text messages and asking you to update, validate or confirm your
account.
websites created to look like * It is often presented in a manner that seems
they're from authentic companies. official and intimidating, to encourage you to
take action.
They're sent by criminals to steal * Provides cyber criminals with your
personal and financial information username and passwords so that they can
from you. This is also known as access your accounts (your online bank
account, shopping accounts, etc.) and steal
“spoofing”. your credit card numbers.
Ransomware
Ransomware is a type of malware
that restricts access to your What it can do:
computer or your files and displays There are two
a message that demands payment common types of
in order for the restriction to be ransomware:
removed. Lockscreen ransomware: displays an
image that prevents you from accessing
The two most common means of your computer
infection appear to be phishing Encryption ransomware: encrypts files
emails that contain malicious on your system's hard drive and
attachments and website pop-up sometimes on shared network drives,
USB drives, external hard drives, and
advertisements.
even some cloud storage drives,
preventing you from opening them.
Ransomware will display a
notification stating that your
computer or data have been locked
and demanding a payment be made
for you to regain access.

Sometimes the notification states


that authorities have detected
illegal activity on your computer,
and that the payment is a fine to What you can do:
avoid prosecution. Do not pay the ransom.
These threats are meant to scare and
intimidate you, and they do not come
from a law enforcement agency.
Even if you submit payment,
there is no guarantee that you
will regain access to your
system.
If your computer has been
infected (i.e. you are unable to
access your computer or your
files have been encrypted),
contact a reputable computer In order to lessen the impact of a
technician or specialist to find ransomware infection, be sure to
out whether your computer can regularly back-up your data with a
be repaired and your data removable external storage drive. It's
retrieved. possible that your files might be
irretrievable; having an up-to-date backu
could be invaluable.
Spam
Spam is one of the more common
methods of both sending What it can do:
information out and collecting it • Annoy you with
from unsuspecting people. unwanted junk mail.
• Create a burden for
The mass distribution of communications service providers and
unsolicited messages, businesses to filter electronic messages.
advertising or pornography to • Phish for your information by tricking
addresses which can be easily you into following links or entering
found on the Internet through details with too-good to-be-true offers
things like social networking and promotions.
sites, company websites and • Provide a vehicle for malware, scams,
personal blogs. fraud and threats to your privacy.
Spyware (Spyware & Adware)
Spyware and adware are often What it can do:
used by third parties to infiltrate • Collect information
about you without you
your computer. What it is:
knowing about it and
Software that collects personal give it to third parties.
information about you without you • Send your usernames, passwords, surfing
knowing. habits, list of applications you've downloaded,
settings, and even the version of your
They often come in the form of a operating system to third parties.
‘free' download and are installed • Change the way your computer runs
without your knowledge.
automatically with or without your
• Take you to unwanted sites or inundate you
consent. These are difficult to with uncontrollable pop-up ads.
remove and can infect your
computer with viruses.
Trojan Horses
A Trojan horse may not be a
term you're familiar with, but
there's a good chance you or
What it can do:
someone you know has been
• Delete your files.
affected by one.
• Use your computer to hack other
computers.
A malicious program that is
• Watch you through your web cam.
disguised as, or embedded
• Log your keystrokes (such as a
within, legitimate software.
credit card number you entered in an
online purchase).
It is an executable file that will
• Record usernames, passwords and
install itself and run
other personal information.
automatically once it's
downloaded.
Viruses
Most people have heard of
computer viruses, but not many
know exactly what they are or
what they do. Malicious computer
programs that are often sent as
an email attachment or a What they can do:
download with the intent of • Send spam.
infecting your computer, as well • Provide criminals with access to
as the computers of everyone in your computer and contact lists.
your contact list. Just visiting a • Scan and find personal
site can start an automatic information like passwords on your
download of a virus. computer.
Hijack your web browser.
Disable your security settings.
Display unwanted ads.
When a program is running, the
virus attached to it could infiltrate
your hard drive and also spread to How will you know if your
USB keys and external hard drives. computer is infected? Here are a
Any attachment you create using few things to check for:
this program and send to someone It takes longer than usual for your
else could also infect them with the computer to start up, it restarts on
virus. its own or doesn't start up at all.
It takes a long time to launch a
program.
Files and data have disappeared.
Your system and programs crash
constantly.
The homepage you set on your web
browser is different (note that this
could be caused by Adware that has
been installed on your computer).
Web pages are slow to load.
Your computer screen looks
distorted. If you suspect a problem, make
Programs are running without your sure your security software is
control. up to date and run it to check
for infection. If nothing is
found, or if you are unsure of
what to do, seek technical help.
Wi-Fi Eavesdropping
WiFi eavesdropping is another method
used by cyber criminals to capture
personal information. Virtual “listening
in” on information that's shared over an
unsecure (not encrypted) WiFi
network.

What it can do:


• Potentially access your computer
with the right equipment.
• Steal your personal information
including logins and passwords.
Worms
Worms are a common threat to
computers and the Internet as a
whole. A worm, unlike a virus, goes
to work on its own without
attaching itself to files or programs.
It lives in your computer memory, What they can do:
doesn't damage or alter the hard Spread to everyone in your contact
drive and propagates by sending list.
itself to other computers in a Cause a tremendous amount of
network – whether within a damage by shutting down parts of
company or the Internet itself. the Internet, wreaking havoc on an
internal network and costing
companies’ enormous amounts of lost
revenue.
Thank You!

You might also like