ETECH PPT - Artuz, Efren, Elazegui and Garlando

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Artuz, Alessandra May

Efren, Carlo Jay


Elazegui, Kristelle Bernadette
Garlando, Emmanuel Joseph

1
WHAT IS AN ONLINE
PLATFORM?
▸ It is an online marketplace wherein you can in touch with one another, such as the
consumer and the seller.
▸ A public-facing internet website, web application, or digital application, including a social
network, ad network, or search engine, that sells advertisements directly to advertisers.

PURPOSE AND BENEFITS


This platform intermediate information and communication flows through internet. It is also an innovation since the
business owners brought their work through online which is more accessible for other people who had a hectic schedule.
Online platform becomes a major part of our lives when pandemic happens. Since it is a must to stay at home, many people
engage through online selling and became their source of living.

REFERENCE LIST:
https://www.pcmag.com/encyclopedia/term/online-platform
https://ec.europa.eu/digital-single-market/en/news/how-do-online-platforms-shape-our-lives-and-businesses-brochure

2
EXAMPLES
OF ONLINE
PLATFORMS
3
(IN GENERAL)
SOCIAL MEDIA PLATFORM E-COMMERSE PLATFORM ONLINE LEARNING

1 means a mobile and/or internet-


based platform used and controlled by
is a software application that allows
online businesses to manage their
website, marketing, sales and
PLATFORM
is an integrated set of
a Seller or any of its Affiliates for the interactive online services that
exclusive purpose of promoting the operations. provide trainers, learners, and
Business, including any profiles or others involved in education with
accounts on Facebook, Google+, information, tools and resources to
Instagram, Pinterest, Tumblr, Twitter, support and enhance education
Snapchat and etc. delivery and management
(IN SPECIFIC)
.
Ebay Uber Airbnb
an online riding app wherein you a platform where you can rent
an online shopping site that’s best can book a car whether you’re someone’s primary residences as
known for its auctions and running an errand or travelling a lodgings for those who love to
consumer to consumer sales city. Instead of waiting for a taxi, travel. Especially to those group
this is more accessible since
travelers, they would choose to
you’ll just have to wait for a car
have a comfortable place to stay.
and it would take you to your
destination.

REFERENCE LIST:
https://ecommerce-platforms.com/glossary/what-is-ebay
https://www.uber.com/us/en/about/
https://www.investopedia.com/articles/investing/112414/how-airbnb-makes-money.asp
5
6
CYBERCRIME
Computers and networking have only been around for a few decades. Therefore,
cybercrime thus far has a short but colorful history. Cyber crime first emerged mostly
to countries who have advanced technologies which easily adopted computer and
computer network. Computers, computer networks and the Internet were created for
the creation, storage and transfer of government and corporate information,
information that is very valuable to the right people. The creation of a digitized
methods may have pushed mankind into the 21st century but it did the same thing for
criminals.

1950s.
The 'phone phreaking’ emerged. This type of cyber crime focuses only on telephones
as computers haven't widely used yet on this period of time. Phreaks refers to people
with a particular interest in the workings of phones. They used to hijack the protocols
that allowed telecoms engineers to work on the network remotely to make free calls
and avoid long-distance tolls. Fortunately, it eventually ended in 1980s.

7
1960s.
Computers became accessible to a limited number of people. Some of these are programmers
and students from well known organizations who sought to explore and develop this type of
technology. Hacking and any sort of cyber crime aren't that big of an issue because these
devices are accessible only to certain type of people.

1970s.
The existence of Cybersecurity. Researcher Bob Thomas invented the first virus called
Creeper to see how it will perform to computers. To solve the problem, a computer program
named Reaper which is one of the first samples of antivirus software was invented by Ray
Tomlinson which killed the Creeper. This made everyone including the government, companies
and organizations realize how essential computer security is.

1980s.
The 1980s brought an increase in high-profile attacks. The movie War Games, in which a rogue
computer program takes over nuclear missiles systems under the guise of a game, was
released in 1983. This was the same year that the terms Trojan Horse and Computer Virus were
first used. Cyber crime became a major threat during this period as Cold War also started.

8
1990s.
New virus and malware numbers exploded in the 1990s. By the mid-‘90s, it was clear that
cybersecurity had to be mass-produced to protect the public. Towards the end of the 1990s,
email was proliferating and while it promised to revolutionize communication, it also opened up
a new entry point for viruses. In 1999, the Melissa virus was unleashed. It entered the user’s
computer via a Word document and then emailed copies of itself to the first 50 email
addresses in Microsoft Outlook. It remains one of the fastest spreading viruses and the damage
cost around $80 million to fix.

2000s.
In 2001, a new infection technique appeared: users no longer needed to download files –
visiting an infected website was enough as bad actors replaced clean pages with infected ones
or ‘hid’ malware on legitimate webpages. Another innovation this decade was OS security –
cybersecurity that’s built into the operating system, providing an additional layer of protection.
This often includes performing regular OS patch updates, installation of updated antivirus
engines and software, firewalls, and secure accounts with user management. With the
proliferation of smartphones, antivirus was also developed for Android and Windows mobile.

2010s
The 2010s saw many high-profile breaches and attacks starting to impact the national security
of countries and cost businesses millions. As cybersecurity developed to tackle the expanding
range of attack types, criminals responded with their own innovations: multi-vector attacks
and social engineering. Attackers were becoming smarter and antivirus was forced to shift
away from signature-based methods of detection to ‘next generation’ innovations

9
CYBERCRIME
ISSUES
Cybercrime that compromises
privacy

10

Data is considered a commodity online and offline by both legal and illegal
actors (Maras, 2016). For this reason, data is a primary target of cybercriminals.
Data also plays an integral role in the commission of many cybercrimes,
primarily because it is not adequately protected and can be illicitly accessed and
obtained. Data breaches have resulted from lost or stolen encrypted flash drives
and other storage devices (mainly laptop and smartphones), poor system and
data security, unauthorized access to the database or the exceeding of
authorized access to a database, and accidental disclosure, release or
publication of data. Some notable examples of data breaches include:
 India's national centralized government ID database (Aadhaar), which
stores the biometric data (i.e., thumbprints and iris scans) and identity
data of 1.2 billion Indians, and is used to verify nationals' identities for
financial, government, utilities, and others services, was subjected to a
database breach in 2018, resulting in the compromise of identity data,
such as access names, twelve-digit identity number, phone numbers,
email addresses, and postal codes, but not the biometric data (Safi, 2018;
Doshi, 2018).

12
 Over three billion Yahoo users' data were compromised in
2013, including names, email addresses, passwords (with
encryption that could be easily bypassed) and birth dates
(Newman, 2017).

 The personal and biometric data of over 55 million voters


in the Philippines were compromised in 2016, after black
hat hackers (for information on the distinction between
black, white, and grey hat hackers, see Module 2 on
General Types of Cybercrime; see also Radziwill et al.,
2015; Chatelain, 2018b) gained unauthorized access to
the Commission of Election (COMELEC) website (Tan,
2016).

Stolen passwords can cause harm beyond the compromised


accounts as people often recycle passwords and use them
(or parts of these passwords; for example, certain numbers)
on more than one website, email account, app, and/or online
platform.

13
REFERENCE LIST:
https://www.sciencedirect.com/science/article/pii/B9781931836654500070
https://www.britannica.com/topic/cybercrimehttps://cybersecurityventures.com/the-history-of-cybercrime-
andcybersecurity-1940-2020/
https://www.unodc.org/e4j/en/cybercrime/module-10/key-issues/cybercrime-that-compromises-
privacy.html#:~:text=Cybercrime%20violates%20individuals'%20privacy%20and,audio%20recordings%20without
%20individuals'%20consent
https://ecommerce-platforms.com/glossary/what-is-ebay
https://www.uber.com/us/en/about/
https://www.investopedia.com/articles/investing/112414/how-airbnb-makes-money.asp

14

You might also like