0% found this document useful (0 votes)
110 views

Policing The Internet

This document discusses various topics related to privacy, surveillance, data security, and ethics online. It defines a data breach as an unauthorized access of information from a system. Data breaches can result from hacking, malware attacks, insider leaks, or unintended disclosures. Cybercrime laws establish rules for acceptable online behavior and consequences for illegal acts. The Cybercrime Prevention Act of 2012 addresses computer crimes under Philippine law. Application security focuses on protecting data and code during development and deployment. Types of application security include authorization, authentication, auditing, and cryptography. The document also discusses online ethics, etiquette, avoiding spam and securing personal information online.

Uploaded by

rowena jamero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views

Policing The Internet

This document discusses various topics related to privacy, surveillance, data security, and ethics online. It defines a data breach as an unauthorized access of information from a system. Data breaches can result from hacking, malware attacks, insider leaks, or unintended disclosures. Cybercrime laws establish rules for acceptable online behavior and consequences for illegal acts. The Cybercrime Prevention Act of 2012 addresses computer crimes under Philippine law. Application security focuses on protecting data and code during development and deployment. Types of application security include authorization, authentication, auditing, and cryptography. The document also discusses online ethics, etiquette, avoiding spam and securing personal information online.

Uploaded by

rowena jamero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

PRIVACY AND

SURVEILLANCE

Reported by:
Jamero, Kathleen May D.
DATA BREACH

• A data breach is an incident where information is stolen


or taken from a system without the knowledge or
authorization of the system’s owner. A small company or
large organization may suffer a data breach.
• Stolen data may include sensitive proprietary or
confidential information such as credit card
number, customer data, trade secrets or matter of
national security.
• Most data breaches are attributed to hacking or malware
attacks. Other frequently observed breach methods
include the following:
Insider leak Unintended disclosure
Payment card fraud Unknown
Loss or theft
CYBERCRIME POLICE
• Cybercrime law identifies standards of acceptable behavior for
information and communication technology (ICT) users;
establishes socio-legal sanctions for cybercrime; protects ICT
users, in general, and mitigates and/or prevents harm to people,
data, systems, services, and infrastructure, in particular; protects
human rights; enables the investigation and prosecution of crimes
committed online (outside of traditional real-world settings); and
facilitates cooperation between countries on cybercrime matters.
RA. 10175 OR CYBERCRIME
PREVENTION ACT OF 2012
• Cybercrime Prevention Act of 2012” which completely
address crimes committed against and by means of
computer system on 12 September 2012. It includes penal
substantive rules, procedural rules and also rules on
international cooperation.

• Section 3, 4, 5
SECURITY APPLICATION
• Application security refers to security precautions used at the
application level to prevent the theft or hijacking of data or code
within the application. It includes security concerns made during
application development and design, as well as methods and
procedures for protecting applications once they’ve been
deployed.
TYPES OF SECURITY
APPLICATION
1. Authorization- A user may be authorized to access and use the application
after being authenticated.
2. Authentication- When developers include protocols in an application to
ensure that only authorized users have access to it.
3. Auditing- The purpose of web application audit is to review an application’s
codebase to determine whether the code is doing something it shouldn’t.
4. Cryptography is the study of secure communications techniques that allow
only the sender and intended recipient of a message to view its contents.
ONLINE ETHICS
ETHICS, ETIQUETTE,
NETIQUETTES
• Online ethics refers to patterns of behavior used when on
the Internet, guided both by law and personal philosophy.
• Etiquette is a set of rules indicating the proper and polite
way to behave.
1. Be respectful
2. Be aware of strong language, all caps, and exclamation points.
3. Be careful with humor and sarcasm
4. Yes, grammar and spelling matter.
5. Cite your sources.
6. Don’t post or share (even privately) inappropriate material.
7. Be forgiving.
• Netiquette is a set of unofficial rules for
good behavior and politeness followed by
users of online and digital technologies
such as the Internet, email, and chat
rooms.
ETHICAL DILLEMAS
ON THE WEB
• An ethical dilemma is a conflict between alternatives where, no
matter what a person does, some ethical principle will be
compromised. Analyzing the options and their consequences
provides the basic elements for decision-making.
• Spam is any kind of unwanted, unsolicited digital communication
that gets sent out in bulk. Often spam is sent via email, but it can
also be distributed via text messages, phone calls, or social
media.
• Social spam is unwanted spam content appearing on social
networking services, social bookmarking sites, and any website
with user-generated content (comments, chat, etc.)
• Lucky winner spam
ONLINE SECURITY AND SAFETY
• Set up alerts.
• Keep devices and apps up to date.
• Don't use public Wi-Fi.
• Consider using a VPN.
• Create unique passwords.

You might also like