0% found this document useful (0 votes)
5 views

Week Cybercrime

Uploaded by

Cj boy Rodriguez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Week Cybercrime

Uploaded by

Cj boy Rodriguez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Republic of the Philippines

CENTRAL BICOL STATE UNIVERSITY OF AGRICULTURE


Calabanga | Pasacao | Pili | Sipocot

CYBERCRIME
CYBERCRIME
This are criminal activities that involve the use of
computers, networks, or the internet to commit illegal
acts. These crimes can target individuals,
organizations, or governments, often leading to
financial loss, data breaches, or personal harm.
Hacking
Phishing
Identity Theft
Cyberbullying
Online Fraud
Ransomware
Spreading Virus
Cyberterrorism
IMPACT OF CYBERCRIME
 Financial loss to individuals, businesses, or
governments.
 Privacy breaches and misuse of personal data.
 Emotional and mental harm, especially in cases of
cyberbullying.
 Damage to reputation or trust.
PREVENTION OF CYBERCRIME
 Use strong passwords and change them regularly.
 Avoid clicking on suspicious links or downloading
untrusted files.
 Keep software and antivirus programs updated.
 Be cautious with sharing personal information
online.
 Educate yourself on the latest cyber threats.
Cybercrime laws, like the Cybercrime
Prevention Act in the Philippines (RA
10175), help penalize offenders and
protect individuals online.
REFERENCES:
https://ph.images.search.yahoo.com/search/images;_ylt=AwrKDujPKVVnQQIAJvazRwx.;_ylu=Y29sbwNzZzMEcG9zAzEEdnRpZAMEc2VjA3BpdnM-?
p=Cybercrime+pdf&fr2=piv-web&type=E210PH1589G0&fr=mcafee#id=21&iurl=https%3A%2F%2Fptop.only.wip.la%3A443%2Fhttps%2Fwww.wpfarm.com%2Fwp-content%2Fuploads%2FiStock-
1201162639.jpg&action=click
Republic of the Philippines
CENTRAL BICOL STATE UNIVERSITY OF AGRICULTURE
Calabanga | Pasacao | Pili | Sipocot

CYBERCRIME - QUIZ
1. You receive an email that appears to be from your
bank, asking you to click a link to "verify your
account." The link takes you to a fake website that
looks like the bank's official site, where you are
asked to enter your login credentials.
2. A cybercriminal steals your personal information, such
as your full name, Social Security number, and bank
details, to open credit cards or loans in your name. You
only find out when you receive bills for purchases you
didn't make.
3. A student receives hurtful and threatening
messages on social media from anonymous
accounts. The bully posts false rumors and
embarrassing photos online to humiliate the
student.
4. A user unknowingly downloads a computer virus from
a free software website. The virus spreads through the
user's email contacts, sending infected attachments to
others. As the virus spreads, it corrupts files, slows down
systems, and compromises sensitive information.
5. A cybercriminals gains unauthorized access to a
company's database and steals sensitive customer
information, such as names, addresses, and credit card
details.
6. A person comes across a fake online store offering high-
end electronics at extremely low prices. They place an
order and pay through an online payment system. After
paying, they never receive the product, and the website
disappears.
7. A group of hackers affiliated with a terrorist
organization launches a cyberattack on a country's power
grid. They use malware to disrupt the system, causing
widespread blackouts in major cities and creating panic
and chaos.
8. A business employee clicks on a malicious email
attachment that contains malicious software. The
malware encrypts all the company’s important files and
displays a message demanding a ransom payment in
cryptocurrency in exchange for the decryption key.
10. TRUE or FALSE
Cybercrime can Damage the reputation or trust of someone’s life.
1. Phishing

2. Identity theft

3. Cyberbullying

4. Spread of Computer Viruses

5. Hacking

6. Online

7. Cyberterrorism

8. Ransomware

9. False

10. False

You might also like