Professional Documents
Culture Documents
ETECH PPT - Artuz, Efren, Elazegui and Garlando
ETECH PPT - Artuz, Efren, Elazegui and Garlando
ETECH PPT - Artuz, Efren, Elazegui and Garlando
1
WHAT IS AN ONLINE
PLATFORM?
▸ It is an online marketplace wherein you can in touch with one another, such as the
consumer and the seller.
▸ A public-facing internet website, web application, or digital application, including a social
network, ad network, or search engine, that sells advertisements directly to advertisers.
REFERENCE LIST:
https://www.pcmag.com/encyclopedia/term/online-platform
https://ec.europa.eu/digital-single-market/en/news/how-do-online-platforms-shape-our-lives-and-businesses-brochure
2
EXAMPLES
OF ONLINE
PLATFORMS
3
(IN GENERAL)
SOCIAL MEDIA PLATFORM E-COMMERSE PLATFORM ONLINE LEARNING
REFERENCE LIST:
https://ecommerce-platforms.com/glossary/what-is-ebay
https://www.uber.com/us/en/about/
https://www.investopedia.com/articles/investing/112414/how-airbnb-makes-money.asp
5
6
CYBERCRIME
Computers and networking have only been around for a few decades. Therefore,
cybercrime thus far has a short but colorful history. Cyber crime first emerged mostly
to countries who have advanced technologies which easily adopted computer and
computer network. Computers, computer networks and the Internet were created for
the creation, storage and transfer of government and corporate information,
information that is very valuable to the right people. The creation of a digitized
methods may have pushed mankind into the 21st century but it did the same thing for
criminals.
1950s.
The 'phone phreaking’ emerged. This type of cyber crime focuses only on telephones
as computers haven't widely used yet on this period of time. Phreaks refers to people
with a particular interest in the workings of phones. They used to hijack the protocols
that allowed telecoms engineers to work on the network remotely to make free calls
and avoid long-distance tolls. Fortunately, it eventually ended in 1980s.
7
1960s.
Computers became accessible to a limited number of people. Some of these are programmers
and students from well known organizations who sought to explore and develop this type of
technology. Hacking and any sort of cyber crime aren't that big of an issue because these
devices are accessible only to certain type of people.
1970s.
The existence of Cybersecurity. Researcher Bob Thomas invented the first virus called
Creeper to see how it will perform to computers. To solve the problem, a computer program
named Reaper which is one of the first samples of antivirus software was invented by Ray
Tomlinson which killed the Creeper. This made everyone including the government, companies
and organizations realize how essential computer security is.
1980s.
The 1980s brought an increase in high-profile attacks. The movie War Games, in which a rogue
computer program takes over nuclear missiles systems under the guise of a game, was
released in 1983. This was the same year that the terms Trojan Horse and Computer Virus were
first used. Cyber crime became a major threat during this period as Cold War also started.
8
1990s.
New virus and malware numbers exploded in the 1990s. By the mid-‘90s, it was clear that
cybersecurity had to be mass-produced to protect the public. Towards the end of the 1990s,
email was proliferating and while it promised to revolutionize communication, it also opened up
a new entry point for viruses. In 1999, the Melissa virus was unleashed. It entered the user’s
computer via a Word document and then emailed copies of itself to the first 50 email
addresses in Microsoft Outlook. It remains one of the fastest spreading viruses and the damage
cost around $80 million to fix.
2000s.
In 2001, a new infection technique appeared: users no longer needed to download files –
visiting an infected website was enough as bad actors replaced clean pages with infected ones
or ‘hid’ malware on legitimate webpages. Another innovation this decade was OS security –
cybersecurity that’s built into the operating system, providing an additional layer of protection.
This often includes performing regular OS patch updates, installation of updated antivirus
engines and software, firewalls, and secure accounts with user management. With the
proliferation of smartphones, antivirus was also developed for Android and Windows mobile.
2010s
The 2010s saw many high-profile breaches and attacks starting to impact the national security
of countries and cost businesses millions. As cybersecurity developed to tackle the expanding
range of attack types, criminals responded with their own innovations: multi-vector attacks
and social engineering. Attackers were becoming smarter and antivirus was forced to shift
away from signature-based methods of detection to ‘next generation’ innovations
9
CYBERCRIME
ISSUES
Cybercrime that compromises
privacy
10
“
Data is considered a commodity online and offline by both legal and illegal
actors (Maras, 2016). For this reason, data is a primary target of cybercriminals.
Data also plays an integral role in the commission of many cybercrimes,
primarily because it is not adequately protected and can be illicitly accessed and
obtained. Data breaches have resulted from lost or stolen encrypted flash drives
and other storage devices (mainly laptop and smartphones), poor system and
data security, unauthorized access to the database or the exceeding of
authorized access to a database, and accidental disclosure, release or
publication of data. Some notable examples of data breaches include:
India's national centralized government ID database (Aadhaar), which
stores the biometric data (i.e., thumbprints and iris scans) and identity
data of 1.2 billion Indians, and is used to verify nationals' identities for
financial, government, utilities, and others services, was subjected to a
database breach in 2018, resulting in the compromise of identity data,
such as access names, twelve-digit identity number, phone numbers,
email addresses, and postal codes, but not the biometric data (Safi, 2018;
Doshi, 2018).
12
Over three billion Yahoo users' data were compromised in
2013, including names, email addresses, passwords (with
encryption that could be easily bypassed) and birth dates
(Newman, 2017).
13
REFERENCE LIST:
https://www.sciencedirect.com/science/article/pii/B9781931836654500070
https://www.britannica.com/topic/cybercrimehttps://cybersecurityventures.com/the-history-of-cybercrime-
andcybersecurity-1940-2020/
https://www.unodc.org/e4j/en/cybercrime/module-10/key-issues/cybercrime-that-compromises-
privacy.html#:~:text=Cybercrime%20violates%20individuals'%20privacy%20and,audio%20recordings%20without
%20individuals'%20consent
https://ecommerce-platforms.com/glossary/what-is-ebay
https://www.uber.com/us/en/about/
https://www.investopedia.com/articles/investing/112414/how-airbnb-makes-money.asp
14