Professional Documents
Culture Documents
CYBERCRIME
CYBERCRIME
It is the characteristics of the culture of computers, information, technology and virtual reality.
Cybercrime
- also called computer crime - the use of a computer as an instrument to further illegal ends, such
as committing fraud, trafficking, Intellectual property, violating privacy.
CYBERCRIMINALS
may use computer technology to access personal information, business trade secrets or use the
internet for exploitative or malicious purposes.
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or
record literary, artistic, or musical material, and to authorize others to do the same.
Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights
through the unauthorized use of a copyrighted material or work.
Plagiarism
- An act or instance of using or closely imitating the language and thoughts of another author
without authorization.
Computer Addiction
Offline: generally used when speaking about excessive gaming behavior, which can be practiced
both offline and online.
Online: Also known as “Internet Addiction”, gets more attention in general from scientific
research than offline computer addiction, mainly because most cases of computer addiction are
related to the excessive use of the Internet. *Virtual Self -The persona you create about yourself
virtually.
Do:
INTELLECTUAL PROPERTY
RA 8293 is also known as the Intellectual Property Code of the Philippines, which governs and protects
all intellectual properties within the Philippines. Basically, the whole act or law states that the Philippines
will be administering, preserving, and protecting specific intellectual property rights. The most well-
known types are copyrights, patents, trademarks, and trade secrets.
IDENTITY THEFT
Identity theft is the crime of obtaining the personal or financial information of another person to
use their identity to commit fraud, such as making unauthorized transactions or purchases.
Under the Cybercrime Prevention Act of 2012 (Republic Act No. 10175), computer-related identity
theft is defined as “the intentional acquisition, use, misuse, transfer, possession, alteration or
deletion of identifying information belonging to another, whether natural or juridical, without right”
[Sec. 4(b)(3)
Identity theft covers identifying information, which refers to any name or number that may be used
alone or in conjunction with any other information to identify any specific individual, including any
of the following:
1. Name, date of birth, driver’s license number, passport number or tax identification number;
2. Unique biometric data, such as fingerprint or other unique physical representation;
3. Unique electronic identification number, address or routing code; and
4. Telecommunication identifying information or access device.
HACKING
Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks. Hacking nowadays most references to hacking, and
hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain,
protest, information gathering (spying), and even just for the “fun” of the challenge.
Hacking is typically technical in nature. Hackers can also use psychology to trick the user into clicking
on a malicious attachment or providing personal data. These tactics are referred to as “social
engineering.”
Types of hacking/hackers
Hackers attempt to break into computers and networks for any of four reasons.
There's a criminal financial gain, meaning the theft of credit card numbers or defrauding
banking systems.
Next, gaining street cred and burnishing one's reputation within hacker subculture motivates
some hackers as they leave their mark on websites they vandalize as proof that they pulled off
the hack.
Then there's corporate espionage, when one company's hackers seek to steal information on a
competitor's products and services to gain a marketplace advantage.
Finally, entire nations engage in statesponsored hacking to steal business and/or national
intelligence, to destabilize their adversaries' infrastructure, or even to sow discord and
confusion in the target country.
Hacking prevention
Anti-malware protection
Be careful with apps
Protect your info
Update your software
Browse carefully
Password safety
CYBER SECURITY
Cyber security refers to the body of technologies, processes, and practices designed to
protect networks, devices, programs, and data from attack, damage, or unauthorized
access.
Cyber security may also be referred to as information technology security.
Malware is a form of malicious software in which any file or program can be used to harm a
computer user.
Ransomware is another type of malware. It involves an attacker locking the victim's computer
system files .
Phishing is a form of social engineering where fraudulent email or text messages that resemble
those from reputable or known sources are sent.
Spear phishing is a type of phishing attack that has an intended target user, organization or
business.
Challenge to cyber security should also address end-user education, as individuals may
accidently bring viruses into the workplace on their laptops or mobile devices.
Regular security awareness training will help individuals do their part in keeping their workplace
safe from cyber threats. THANK YOU…