Professional Documents
Culture Documents
Cybercrime - Digital Security and Data Privacy Act PDF
Cybercrime - Digital Security and Data Privacy Act PDF
Cybercrime - Digital Security and Data Privacy Act PDF
College of Sciences
GE ELECT 1
LIVING IN THE IT ERA
Module 8
CYBERCRIME,
DIGITAL SECURITY
AND
DATA PRIVACY ACT
1
Overview
Now that you have you have understood Computer Ethics, let us go
deeper by also understanding different cybercrimes , digital security and
data privacy act.
2
Learning Outcomes
3
Initial Activity
Before going through this module, let us first check your prior knowledge
about this topic.
Try to fill out as many hexagons as you can with any type of crime that
can occur with the help of any computer.
4
Discussion
5
Discussion
EXAMPLES OF CYBERCRIME
So, what exactly is a cybercrime? And are there any well-known examples?
In this part of the module, we look at some examples of different types of
cybercrime attack used by cybercriminals.
Cyberbullying
Harassing or bullying other people online.
Child pornography
Making or distributing child pornography.
Fraud
Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
6
Discussion
EXAMPLES OF CYBERCRIME
Spoofing
Deceiving a system into thinking that you are someone you really are not.
Identity theft
Pretending to be someone you are not and using it for transactions to gain
access.
Online libel
Any inaccurately or injuriously written defamation triggered via electronic
means, including the Internet, social media, email and websites.
Hacking
The unauthorized access to or control over computer network security
systems for some illicit purpose.
Defacing
Changing the content of website to lure other people.
Hijacking
Redirecting someone elsewhere trying to access a particular website.
7
Discussion
EXAMPLES OF CYBERCRIME
Bombing
Overwhelming a site with countless messages to slow down or even
crash the server.
Denial of service
Program which sends thousands of requests to a site simultaneously,
causing a server to slow down or crash.
Computer Vandalism
A process wherein there is a program that performs malicious function
such as extracting a data or erasing the hard disk.
8
Discussion
EXAMPLES OF CYBERCRIME
Types of Malware
❏ Virus
Designed to damage its target computer by corrupting data,
reformatting your hard disk, or completely shutting down your system.
❏ Worm
Designed to spread over computer networks by exploiting operating
system vulnerabilities.
❏ Trojan Horse
A program that performs malicious actions while pretending the such
actions are harmless.
❏ Spyware
Designed to track your browsing habits and internet activity.
❏ Ransomware
A program that holds your data captive and demands payment to
release the data back to you.
9
Discussion
EXAMPLES OF CYBERCRIME
Cybersquatting
Setting up a domain of another person or company with the sole intentions of
selling it to them later at a premium price.
Copyright Infringement
Stealing or using another person's Copyrighted material without permission.
Software piracy
Illegally copying software that does not belong to you in a manner that
violates the copyright.
Cyber warfare
The use of technology to attack a nation, causing comparable harm to actual
warfare.
Cyber terrorism
The use of computer programs for internet-based attacks in terrorist
activities.
10
Learning Check
Let us check what you have learned in these prior topics discussed about
computer crimes by completing the following statements:
I know why …
__________________________________________________________
__________________________________________________________
One reason is …
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
11
Discussion
DIGITAL SECURITY
Did you know that there are Three Pillars of Digital Security?
Here they are..
❏ Confidentiality
Keeping it confidential, from creating a strong password to using a
fingerprint scanner, storing information through cloud security or invest
in an encryption device.
❏ Integrity
Makes sure that the data you’re keeping confidential and secure hasn’t
been modified or corrupted. You also need to consider the source of the
data.
❏ Availability
Maintaining all hardware, performing hardware repairs in a timely
manner, and ensuring your operating system is free of any bugs,
worms, or viruses.
12
Discussion
DIGITAL SECURITY
Here are some digital security tools that you can use:
13
Discussion
DIGITAL SECURITY
SilentPhone for phone calls is perfect if you want to protect your telephone
conversations. There is also Signal which was created by a firm called the
“Guardian Project”. Signal encrypts your voice and video conversations.
If you are someone who shares important information via instant messaging,
you should use Cyph which encrypts messages for both Mac and Windows
users.
ChatSecure is another great tool which works perfectly on iOS and Android
platforms.
14
Discussion
Have you ever tried to fill out any form with your personal data and
wondering where your data would go after?
What if someone uses your data in it without your permission?
What is it?
Republic Act No. 10173, otherwise known as the Data Privacy Act is a law
that seeks to protect all forms of information, be it private, personal, or
sensitive.
15
Discussion
Are there any exceptions to the application of the Data Privacy Act?
This act does not apply to the following:
(a) Information about any individual who is or was an officer or employee of a
government institution that relates to the position or functions of the individual,
including:
(1) The fact that the individual is or was an officer or employee of the
government institution;
(2) The title, business address and office telephone number of the
individual;
(3) The classification, salary range and responsibilities of the position
held by the individual; and
(4) The name of the individual on a document prepared by the
individual in the course of employment with the government.
16
Discussion
(e) Information necessary in order to carry out the functions of public authority
which includes the processing of personal data for the performance by the
independent, central monetary authority and law enforcement and regulatory
agencies of their constitutionally and statutorily mandated functions.
17
Discussion
(f) Information necessary for banks and other financial institutions under the
jurisdiction of the independent, central monetary authority or Bangko Sentral
ng Pilipinas to comply with Republic Act No. 9510, and Republic Act No. 9160,
as amended, otherwise known as the Anti-Money Laundering Act and other
applicable laws; and
18
Discussion
19
Reflection
20
Evaluation
21
Evaluation
True or False.
Identify whether the following statements are true or false. Write your answers
at the blank lines provided.
1. A crime without the use of any form of technology can still be considered
as a cybercrime. ______
1. There are no exceptions for the application of Data Privacy Act. ______
22
Evaluation
23
References
[2] National Privacy Commission. (n.d.) Data Privacy Act (DPA) Quick
Guide. Retrieved from
https://www.privacy.gov.ph/quickguide/
24