0% found this document useful (0 votes)
7 views8 pages

EMPTECH-The Disadvantages of ICT

The document outlines various disadvantages of Information and Communication Technology (ICT), focusing on different types of cybercrimes such as phishing, blackmail, hacking, and child pornography. It emphasizes the importance of network security measures and the role of authorities in combating cybercrime through investigation and penalties. The document concludes by highlighting the impact of the Internet on society and the responsibility of users to shape its future.

Uploaded by

tiffany nueve
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

EMPTECH-The Disadvantages of ICT

The document outlines various disadvantages of Information and Communication Technology (ICT), focusing on different types of cybercrimes such as phishing, blackmail, hacking, and child pornography. It emphasizes the importance of network security measures and the role of authorities in combating cybercrime through investigation and penalties. The document concludes by highlighting the impact of the Internet on society and the responsibility of users to shape its future.

Uploaded by

tiffany nueve
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

The

Disadvantag
es of ICT
Presented by group 3
01. Phishing/Spoofing - the act of sending multiple
emails to multiple users in hopes of having a
number of them clicking on the links or malware's
attached to the email. Most email services today

Cybercrime have spam or bulk folders that automatically put


these suspicious emails to that folder. However,
this is not 100% accurate that some emails are not

s 02.
Cybercrimes are illegal acts done
through the use of the Internet. In
filtered and some other emails that are legitimate
end up on the spam folder.
Blackmail/Extortion - the act of using the Internet
2012, Stephen Nale (Complex.com) to threaten or damage someone's reputation to
posted a list of ten most common extort money or anything else of value. This can
be avoided if you are aware of what you should
Internet cybercrimes as follows:
post on the Internet. The victims of this act tend
to have posted something "inappropriate" over
the Internet even if they put it at a secured
03. location.
Accessing Stored Communications - or hacking;
the act of obtaining unauthorized access to data
from a computer network. This is typically done
to commercial and government sites to threaten
its owner. In late 2014, a group of hackers
hacked Sony's website because of the impending
release of the controversial film "The Interview."
04.
Non-Delivery of Merchandise - the act of
devising a scheme wherein a culprit posts an
item or service for sale on the Internet and

Cybercrime once the transactions have been done, does


not really give the item or service.

s 05.
Cybercrimes are illegal acts done
through the use of the Internet. In Electronic Harassment - the act of anonymously
2012, Stephen Nale (Complex.com) using the Internet to harass, abuse, threaten, or
posted a list of ten most common annoy other people. This is also an act of
Internet cybercrimes as follows: cyberbullying, however, because the culprit is
anonymous, it is hard to detect who is bullying
you.
06.
Child Pornography - the act of using the
Internet to show child pornography, This act is
highly punishable by law.
07.
Sports Betting - the act of wagering on any
sports event over the Internet. In some
countries, gambling (including sports betting)

Cybercrime is illegal even if you are doing it over the


Internet.

s 08.
Cybercrimes are illegal acts done
through the use of the Internet. In
2012, Stephen Nale (Complex.com) Prostitution - the act of using the
posted a list of ten most common Internet to engage in prostitution
Internet cybercrimes as follows:

09.
Drug Traffi cking - the act of selling illegal
substances using the Internet
Cybercrime 10.
criminal Copyright Infringement - the

s
Cybercrimes are illegal acts done
through the use of the Internet. In
act of piracy mainly for financial gain.
In late 2014, the number one pirate
website, ThePirateBay, was raided for
2012, Stephen Nale (Complex.com)
the second time due to years of
posted a list of ten most common
Internet cybercrimes as follows: pirating movies, music, games, books,
and other software. These kinds of
websites earn money through
advertising.

The Internet is the present and the future of your generation and you define what
impact it can do to shape our society, whether it is negative or positive. The
future is in your hands.
01. Network Security - Before a hacker can get through
the unauthorized files he or she is targeting, the

Combatting hacker has to get through several security


measures like firewalls, secure connections,
passwords, anti-malwares, and data encryptions.

Cybercrime Encryption is the process of converting raw data


into code. However, these methods are not 100%

02. secure and there will always be a way for a hacker

s
There are several ways the authorities
can help solve or prevent cybercrimes.
to hack.
Investigation - URL tracing and logging are used
by websites to track your unique IP addresses.
Here are some of them: This can be used by investigators to trace
hackers. In piracy, trackers are used to identify IP
addresses currently sharing a pirated file.

03.
Penalties - More and more laws are being
created and implemented today. Penalties
include both a fine and imprisonment.
• Blackmail - act of asking
• Phishing - also something in return of not
referred to as showing something that
spoofing; an act of could damage someone's
spamming emails reputation

• Spam - unwanted • Hacking - the act of


emails obtaining authorized

Key
information

terms
• Cyberbullying - an act of
harassment using
• Encryption - the
electronic means
process of converting
• Copyright Infringement - raw data into code
an act of piracy mainly
for financial gain
Thank you
very
much!

You might also like