Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

CYBERCRIME

CYBERCRIME WHAT IS CYBER?

 It is the characteristics of the culture of computers, information, technology and virtual reality.

Cybercrime

- also called computer crime - the use of a computer as an instrument to further illegal ends, such
as committing fraud, trafficking, Intellectual property, violating privacy.

CYBERCRIMINALS

 may use computer technology to access personal information, business trade secrets or use the
internet for exploitative or malicious purposes.

COMMON FORMS OF CYBERCRIMES:

 The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or
record literary, artistic, or musical material, and to authorize others to do the same.
 Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights
through the unauthorized use of a copyrighted material or work.

Plagiarism

- An act or instance of using or closely imitating the language and thoughts of another author
without authorization.

Computer Addiction

 Offline: generally used when speaking about excessive gaming behavior, which can be practiced
both offline and online.
 Online: Also known as “Internet Addiction”, gets more attention in general from scientific
research than offline computer addiction, mainly because most cases of computer addiction are
related to the excessive use of the Internet. *Virtual Self -The persona you create about yourself
virtually.

The Do’s and Don’ts of Using the Internet

Do:

 Use the internet responsibly and respect others privacy.


 Use the internet to keep in contact with friends and family .
 Look up information on the internet as part of school work and for leisure
 Tell someone if you are being bullied online
 Make sure to include symbols and numbers when making a password so that it will be harder to
crack.
 Be careful when downloading programs from the internet incase they carry viruses, always scan
the program first.
 Use an alias as your user name if you use chat room sites
 Keep a record of all online transactions made and check your bank account regularly.
Don't:

 Give out personal information online


 Arrange to meet people you've met online by yourself, inform an adult or a friend and never
meet them alone.
 Give your password to anyone
 Copy information from the internet and attempt to redistribute it. If you do copy a book, or
music files you must get permission for the author or composer first.
 Don't open or download any attachments from an unknown source as they may contain viruses.
 Fill out any surveys online that ask for your personal details or bank details.

INTELLECTUAL PROPERTY

RA 8293 is also known as the Intellectual Property Code of the Philippines, which governs and protects
all intellectual properties within the Philippines. Basically, the whole act or law states that the Philippines
will be administering, preserving, and protecting specific intellectual property rights. The most well-
known types are copyrights, patents, trademarks, and trade secrets.

The term “intellectual property rights” consists of:

 Trade Secrets refer to specific, private information that is important to a business.


 Patents gives its owner the legal right to exclude others from making, using, or selling an
invention for a limited period of years in exchange for publishing an enabling public disclosure of
the invention.
 Copyrights gives its owner the exclusive right to make copies of a creative work, usually for a
limited time.
 Trademarks consisting of a recognizable sign, design, or expression which identifies products or
services of a particular source from those of others

IDENTITY THEFT

Identity theft is the crime of obtaining the personal or financial information of another person to
use their identity to commit fraud, such as making unauthorized transactions or purchases.

IDENTIFY THEFT AS A CYBERCRIME

Under the Cybercrime Prevention Act of 2012 (Republic Act No. 10175), computer-related identity
theft is defined as “the intentional acquisition, use, misuse, transfer, possession, alteration or
deletion of identifying information belonging to another, whether natural or juridical, without right”
[Sec. 4(b)(3)

Identity theft covers identifying information, which refers to any name or number that may be used
alone or in conjunction with any other information to identify any specific individual, including any
of the following:

1. Name, date of birth, driver’s license number, passport number or tax identification number;
2. Unique biometric data, such as fingerprint or other unique physical representation;
3. Unique electronic identification number, address or routing code; and
4. Telecommunication identifying information or access device.

HACKING

Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks. Hacking nowadays most references to hacking, and
hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain,
protest, information gathering (spying), and even just for the “fun” of the challenge.

Hacking is typically technical in nature. Hackers can also use psychology to trick the user into clicking
on a malicious attachment or providing personal data. These tactics are referred to as “social
engineering.”

Types of hacking/hackers

Hackers attempt to break into computers and networks for any of four reasons.

 There's a criminal financial gain, meaning the theft of credit card numbers or defrauding
banking systems.

Next, gaining street cred and burnishing one's reputation within hacker subculture motivates
some hackers as they leave their mark on websites they vandalize as proof that they pulled off
the hack.

Then there's corporate espionage, when one company's hackers seek to steal information on a
competitor's products and services to gain a marketplace advantage.

Finally, entire nations engage in statesponsored hacking to steal business and/or national
intelligence, to destabilize their adversaries' infrastructure, or even to sow discord and
confusion in the target country.

Hacking prevention

 Anti-malware protection
 Be careful with apps
 Protect your info
 Update your software
 Browse carefully
 Password safety

CYBER SECURITY

 Cyber security refers to the body of technologies, processes, and practices designed to
protect networks, devices, programs, and data from attack, damage, or unauthorized
access.
 Cyber security may also be referred to as information technology security.

Different types of cyber security threats:

 Malware is a form of malicious software in which any file or program can be used to harm a
computer user.
 Ransomware is another type of malware. It involves an attacker locking the victim's computer
system files .
 Phishing is a form of social engineering where fraudulent email or text messages that resemble
those from reputable or known sources are sent.
 Spear phishing is a type of phishing attack that has an intended target user, organization or
business.

CYBER SECURITY CHALLENGES

 Challenge to cyber security should also address end-user education, as individuals may
accidently bring viruses into the workplace on their laptops or mobile devices.
 Regular security awareness training will help individuals do their part in keeping their workplace
safe from cyber threats. THANK YOU…

You might also like